Sample records for unspecified flaw lets

  1. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users...

  2. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    No solution was available at the time of this entry. Addthis Related Articles T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens...

  3. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March...

  4. U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass...

  5. T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been...

  6. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    A remote user can gain unauthorized access on the target system. IMPACT: User access via network SOLUTION: The vendor has issued a fix. Addthis Related Articles U-010:HP Onboard...

  7. U-219: Symantec Web Gateway Input Validation Flaws Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    9: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input...

  8. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

  9. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Broader source: Energy.gov (indexed) [DOE]

    7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

  10. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service...

  11. V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

  12. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am...

  13. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am...

  14. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Environmental Management (EM)

    URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

  15. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  16. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control No.NREL i sAccess

  17. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum

  18. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMBFirmware with Arbitrary

  19. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

  20. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Energy Savers [EERE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  1. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

  2. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    An SVG text handling font processing flaw exists CVE-2011-2877. A cross-origin access control flaw exists CVE-2011-2878. Lifetime and threading issues exist in...

  3. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks T-688: McAfee Security Bulletin - McAfee SaaS Endpoint Protection...

  4. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...

    Broader source: Energy.gov (indexed) [DOE]

    6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

  5. U-174: Serendipity Unspecified SQL Injection Vulnerability |...

    Broader source: Energy.gov (indexed) [DOE]

    4: Serendipity Unspecified SQL Injection Vulnerability U-174: Serendipity Unspecified SQL Injection Vulnerability May 22, 2012 - 7:00am Addthis PROBLEM: Serendipity Unspecified SQL...

  6. U-120: RSA SecurID Software Token Converter Unspecified Buffer...

    Broader source: Energy.gov (indexed) [DOE]

    Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-066: Adobe Acrobat...

  7. U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw...

    Broader source: Energy.gov (indexed) [DOE]

    0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users...

  8. V-075: EMC AlphaStor Command Injection and Format String Flaws...

    Broader source: Energy.gov (indexed) [DOE]

    5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users...

  9. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary...

  10. V-139: Cisco Network Admission Control Input Validation Flaw...

    Broader source: Energy.gov (indexed) [DOE]

    Sensitive Information U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-015: CiscoWorks Common...

  11. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway...

  12. U-270:Trend Micro Control Manager Input Validation Flaw in Ad...

    Broader source: Energy.gov (indexed) [DOE]

    0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc...

  13. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  14. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  15. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code

  16. Flawed reasoning

    SciTech Connect (OSTI)

    Frankena, M.W.; Owen, B.M.

    1993-07-15T23:59:59.000Z

    The FERC's failure to investigate the Entergy/GSU merger's effects on market power may force other agencies to examine electric utility mergers on their own. The competitive effects of the proposed merger Entergy and Gulf States Utilities (GSU) will not be further investigated by the Federal Energy Regulatory Commission (FERC), according to a January 1993 order. The FERC's primary justification is that the [open quotes]open access[close quotes] transmission conditions offered by the merging parties eliminated concern over market power in transmission and bulk power. The FERC's reasoning is flawed. If the merger were to lead to an increase in market power, the proposed transmission conditions would not prevent the merged firm from exercising that power. The FERC also justifies its decision not to investigate the competitive effects of the merger on the grounds that no intervenor had demonstrated that present competition between the two systems is more than de minimis. This is not an appropriate standard. Intervenors demonstrated that Entergy's and GSU's transmission system offer alternative contract routes for bulk power between generators and customers. Even if Entergy and GSU both do not actually sell significant amounts of the same transmission-service, an antitrust evaluation should consider whether the availability of a second, independent route constrains the pricing of the first. The FERC's reasoning indicates that it has lost its way in carrying out its responsibilities to protect consumers. Open access to transmission systems may play an important role in increasing competition in bulk power markets. However, the FERC's goal should be to promote competition, not merely to open access for its own sake. In its enthusiasm to secure [open quotes]open access[close quotes], the FERC appears willing to ignore possible reductions in competition.

  17. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitraryprinters and

  18. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment of Energy 7:

  19. Unspecified Journal Volume 00, Number 0, Pages 000000

    E-Print Network [OSTI]

    Tam, Tin-Yau

    0000 (copyright holder) 1 #12;2 W.S. CHEUNG, XUHUA LIU AND T.Y. TAM Theorem 1.1. ([9, p.50-51]) Let, BOUNDARY POINTS, AND JOINT NUMERICAL RANGES WAI-SHUN CHEUNG, XUHUA LIU AND TIN-YAU TAM Abstract

  20. U-248: Symantec Messaging Gateway Multiple Flaws Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2012-0307 CVE-2012-0308 CVE-2012-3579 CVE-2012-3580 CVE-2012-3581 IMPACT ASSESSMENT: Medium Discussion: Symantec was notified of several security issues impacting Symantec's...

  1. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets...

    Broader source: Energy.gov (indexed) [DOE]

    inspection, as well as subscriber and application awareness capabilities that enable mobile operators to quickly and easily offer value-added, differentiated services over their...

  2. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service...

    Broader source: Energy.gov (indexed) [DOE]

    1.2.16 and 1.4.0 to 1.4.6. 1. Largeinfinite loop in the DICOM dissector. (Bug 5876) 2. Red Hat Security Response Team discovered that a corrupted Diameter dictionary file could...

  3. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538...

  4. V-035: Google Chrome Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    read may occur in Skia CVE-2012-5130. A memory corruption error may occur in the Apple OSX driver for Intel GPUs CVE-2012-5131. A browser crash may occur when processing...

  5. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

    Broader source: Energy.gov (indexed) [DOE]

    SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

  6. U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control

  7. LADE-based Inference for ARMA Models with Unspecified and Heavy-tailed Heteroscedastic Noises

    E-Print Network [OSTI]

    Ling, Shiqing

    and Van Dijk (1996) studied several stock market indexes by AR(1)-GJR(1, 1) models, Zhu and Ling (2011) fitted a MA(3)-GARCH(1, 1) model to the world oil prices, see also Tsay (2005) for more empiricalLADE-based Inference for ARMA Models with Unspecified and Heavy-tailed Heteroscedastic Noises

  8. T-649: Red Hat Network Satellite Server Request Validation Flaw...

    Broader source: Energy.gov (indexed) [DOE]

    49: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks T-649: Red Hat Network Satellite Server Request Validation Flaw Permits...

  9. U-252: Barracuda Web Filter Input Validation Flaws Permit Cross...

    Broader source: Energy.gov (indexed) [DOE]

    2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September...

  10. Fabrication of specimens with controlled flaws

    SciTech Connect (OSTI)

    Edwards, R.L.; Gruber, G.J.; Watson, P.D. [Southwest Research Inst., San Antonio, TX (United States)

    1995-10-01T23:59:59.000Z

    Most nondestructive evaluation (NDE) codes and standards require that the NDE equipment be calibrated using a calibration block. Ultrasonic testing (UT) historically has required the use of side-drilled or flat-bottom holes or notches. Recent technology has recognized that the acoustic response of real flaws is not directly comparable to artificial reflectors. The need arose to manufacture UT test specimens that contained real flaws of known size, shape, position, and orientation. The 1989 Section XI ASME Code, Appendix VIII (ASME Code, 1989), requires NDE qualification of equipment, procedures, and personnel utilizing full-scale test specimens with actual (real) flaws. The same technology could prove of great benefit to industries other than nuclear, particularly for the fracture mechanics approach to fitness-for-purpose or lifetime-extension programs. This paper describes an approach to the design and fabrication of NDE test specimens with controlled flaws.

  11. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits...

    Broader source: Energy.gov (indexed) [DOE]

    0: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks...

  12. T-713: Blue Coat Reporter Directory Traversal Flaw | Department...

    Broader source: Energy.gov (indexed) [DOE]

    3: Blue Coat Reporter Directory Traversal Flaw T-713: Blue Coat Reporter Directory Traversal Flaw September 9, 2011 - 10:47am Addthis PROBLEM: A vulnerability was reported in Blue...

  13. Procedure for flaw detection in cast stainless steel

    DOE Patents [OSTI]

    Kupperman, David S. (Oak Park, IL)

    1988-01-01T23:59:59.000Z

    A method of ultrasonic flaw detection in cast stainless steel components incorporating the steps of determining the nature of the microstructure of the cast stainless steel at the site of the flaw detection measurements by ultrasonic elements independent of the component thickness at the site; choosing from a plurality of flaw detection techniques, one such technique appropriate to the nature of the microstructure as determined and detecting flaws by use of the chosen technique.

  14. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    "qtactivex" parameters within an HTML object. 4) A boundary error when handling the transform attribute of "text3GTrack" elements can be exploited to cause a buffer overflow via...

  15. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  16. U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    HTC One Series, Sensation, Sensation XL, and possibly others; Motorola Droids, and Sony Ericsson Xperia series ABSTRACT: A vulnerability was reported in Google Android...

  17. T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    be confirmed via a browser dialog CVE-2011-2783. A file path may be disclosed in the GL program log CVE-2011-2784. The homepage URL is not sanitized in extensions...

  18. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that,...

  19. U-193: NetBSD System Call Return Value Validation Flaw Lets Local...

    Broader source: Energy.gov (indexed) [DOE]

    elevated privileges on the target system. PLATFORM: Version(s): 4.0.*, 5.0.*, 5.1, 6.0 Beta ABSTRACT: On Intel CPUs, the sysret instruction can be manipulated into returning to...

  20. U-250: Wireshark DRDA Dissector Flaw Lets Remote Users Deny Service...

    Broader source: Energy.gov (indexed) [DOE]

    Wireshark Bug Database - Bug 7666 SecurityTracker Alert ID: 1027464 Bugtraq ID: 55284 Red Hat Bugzilla - Bug 849926 CVE-2012-3548 IMPACT ASSESSMENT: Medium Discussion: An...

  1. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...

    Office of Environmental Management (EM)

    reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSLTLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4...

  2. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Environmental Management (EM)

    This can be exploited to e.g. spoof the server via a MitM (Man-in-the-Middle) attack and e.g. disclose potentially sensitive information. IMPACT: A remote user can spoof...

  3. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Energy Savers [EERE]

    Service Pack 1 ABSTRACT: A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSLTLS sessions. reference LINKS: Microsoft Security Advisory (2588513)...

  4. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and 8.2.x are affected when they are configured for any of the following features: * SSL VPNs * Cisco Adaptive Security Device Manager (ASDM) Administrative Access * Telnet...

  5. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  6. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  7. U-227: bind-dyndb-ldap DN Escaping Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service).

  8. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & Solar Power in the|

  9. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & SolarDepartment ofRemote Users

  10. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & SolarDepartmentArbitrary Code

  11. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergy IBM

  12. V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartmentApple Mac OS X update

  13. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartmentApple Mac OS XCode |

  14. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control No.NREL iUsers

  15. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control No.NREL

  16. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  17. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery Attacks and|

  18. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple | Department| Department

  19. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple | Department|

  20. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple | Department|Conduct

  1. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple | Department|ConductUsers

  2. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthentication orAttacks

  3. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from the GridwiseSiteDepartmentChallengeCompliance7/109 TORNADO * FLASH FLOOD

  4. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian| Department of

  5. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023:Addresses | Department of

  6. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsA documentRed

  7. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsersExecuteGain

  8. V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | Department ofElevated

  9. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |Department of EnergyCode |

  10. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |Department of EnergyCode

  11. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is a commandDepartment

  12. V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is aDepartment of

  13. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami hasService | Department

  14. V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami hasService |Users Gain

  15. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code |

  16. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code|

  17. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting Attacks |Service |Code |

  18. U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address|

  19. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address|Conduct

  20. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment of Energy

  1. U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment ofDepartment of|

  2. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  3. Fabrication Flaws in Reactor Pressure Vessel Repair Welds

    SciTech Connect (OSTI)

    Schuster, George J.; Doctor, Steven R.

    2007-12-01T23:59:59.000Z

    This paper describes the fabrication flaw distribution and characterization in the repair weld metal of reactor pressure vessels. This work indicates that the large flaws occur in these repairs. These results show that repair flaws are complex in composition and sometimes include cracks on the repair ends. Parametric analysis using an exponential fit is performed on the data. A description of repair flaw morphology is provided. Fabrication flaws in repairs are characterized using high sensitivity nondestructive ultrasonic testing, validation by other nondestructive evaluation (NDE) techniques, and complemented by destructive testing.

  4. Status of French flaw evaluation procedures

    SciTech Connect (OSTI)

    Faidy, C. [Electricite de France-SEPTEN, Villeurbanne (France); Barthelet, B. [Electricite de France-EPN, Paris La Defense (France); Drubay, B. [CEA CEN Saclay, Gif-sur-Yvette (France)

    1996-12-01T23:59:59.000Z

    The RSE-M Code is under development in France and the 1996 edition will include a complete flaw evaluation procedure for operating PWRs. For FBRs the authors have developed the RCC-MR for design and they are now developing RSE-MR rules for operating plants; a first set of flaw evaluation rules are proposed in the A16 document for low and high temperature regime. After some comments on the organization of RSE and RCC Committees, the paper presents: (1) the status of the different French code rules (RSE-M and A16 document); (2) how can one take into consideration some complex geometry or loading case situations; (3) some comparisons with ASME Code-Section XI; and (4) few examples of major on-going developments for flaw evaluation for different components. In conclusion, two different sets of rules are under development one in RSE-M for PWRs and one in RSE-MR for FBRs using partly the A16 proposals. These rules have to remain consistent, but not necessary identical due to the specific components covered by these documents. The components can be very different in term of pressure load, operating temperature, transient thermal loads and seismic loads.

  5. Improved Criteria for the Repair of Fabrication Flaws

    SciTech Connect (OSTI)

    Doctor, Steven R.; Schuster, George J.; Simonen, Fredric A.

    2004-12-01T23:59:59.000Z

    Section III of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code for nuclear power plant components requires radiographic examinations (RT) of welds and requires repairs for RT indications that exceed code acceptable sizes. This paper describes research that has generated data on welding flaws, which indicated that the largest flaws occur in repaired welds. The fabrication flaws were detected in material removed from cancelled nuclear power plants using high sensitivity Nondestructive Examination (NDE) and validated by complementary NDE and destructive testing. Evidence suggests that repairs are often for small and benign RT indications at locations buried within the vessel or pipe wall. Probabilistic fracture mechanics calculations are described in this paper to predict the increases in vessel and piping failure probabilities caused by the repair-induced flaws. Calculations address failures of embrittled vessel welds for pressurized thermal shock (PTS) transients and piping failures caused by fatigue crack growth. For vessels the small flaws, which are relatively common, can cause brittle fracture, such that the rarely encountered repair flaws of large sizes gave only modestly increased failure probabilities. Calculations for piping show that only relatively large fabrication flaws can cause failures because of the ductile nature of the piping material. The large repair flaws therefore significantly increased the failure probabilities. The paper recommends the use of more discriminating ultrasonic examinations in place of RT examinations along with repair criteria based on a fitness-for-purpose approach that minimize the number of unjustified repairs.

  6. Fabrication Flaw Density and Distribution in Piping Weldments

    SciTech Connect (OSTI)

    Doctor, Steven R.

    2009-09-01T23:59:59.000Z

    The U.S. Nuclear Regulatory Commission supported the Pacific Northwest National Laboratory (PNNL) to develop empirical data on the density and distribution of fabrication flaws in nuclear reactor components. These data are needed to support probabilistic fracture mechanics calculations and studies on component structural integrity. PNNL performed nondestructive examination inspections and destructive testing on archived piping welds to determine the fabrication flaw size and distribution characteristics of the flaws in nuclear power plant piping weldments. Eight different processes and product forms in piping weldments were studied including wrought stainless steel and dissimilar metal weldments. Parametric analysis using an exponential fit was performed on the data. Results were created as a function of the through-wall size of the fabrication flaws as well as the length distribution. The results are compared and contrasted with those developed for reactor pressure vessel processes and product forms. The most significant findings were that the density of fabrication flaws versus through-wall size was higher in piping weldments than that for the reactor pressure vessel weldments, and the density of fabrication flaws versus through-wall size in both reactor pressure vessel weld repairs and piping weldments were greater than the density in the original weldments. Curves showing these distributions are presented.

  7. Development of a methodology for the assessment of shallow-flaw fracture in nuclear reactor pressure vessels: Generation of biaxial shallow-flaw fracture toughness data

    SciTech Connect (OSTI)

    McAfee, W.J.; Bass, B.R.; Bryson, J.W.

    1998-07-01T23:59:59.000Z

    A technology to determine shallow-flaw fracture toughness of reactor pressure vessel (RPV) steels is being developed for application to the safety assessment of RPVs containing postulated shallow-surface flaws. Shallow-flaw fracture toughness of RPV material has been shown to be higher than that for deep flaws, because of the relaxation of crack-tip constraint. This report describes the preliminary test results for a series of cruciform specimens with a uniform depth surface flaw. These specimens are all of the same size with the same depth flaw. Temperature and biaxial load ratio are the independent variables. These tests demonstrated that biaxial loading could have a pronounced effect on shallow-flaw fracture toughness in the lower transition temperature region for RPV materials. Through that temperature range, the effect of full biaxial (1:1) loading on uniaxial, shallow-flaw toughness varied from no effect near the lower shelf to a reduction of approximately 58% at higher temperatures.

  8. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote and Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThereDepartment ofFlaw LetsUsers

  9. Ultrasonic Flaw Detection of Cracks and Machined Flaws as Observed Through Austenitic Stainless Steel Piping Welds

    SciTech Connect (OSTI)

    Anderson, Michael T.; Cinson, Anthony D.; Crawford, Susan L.; Cumblidge, Stephen E.; Diaz, Aaron A.

    2009-07-01T23:59:59.000Z

    Piping welds in the pressure boundary of light water reactors (LWRs) are subject to a volumetric examination based on Section XI of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code. Due to access limitations and high background radiation levels, the technique used is primarily ultrasonic rather than radiographic. Many of the austenitic welds in safety-related piping systems provide limited access to both sides of the weld, so a far-side examination is necessary. Historically, far-side inspections have performed poorly because of the coarse and elongated grains that make up the microstructures of austenitic weldments. The large grains cause the ultrasound to be scattered, attenuated, and redirected. Additionally, grain boundaries or weld geometry may reflect coherent ultrasonic echoes, making flaw detection and discrimination a more challenging endeavor. Previous studies conducted at the Pacific Northwest National Laboratory (PNNL) on ultrasonic far-side examinations in austenitic piping welds involved the application of conventional transducers, use of low-frequency Synthetic Aperture Focusing Techniques (SAFT), and ultrasonic phased-array (PA) methods on specimens containing implanted thermal fatigue cracks and machined reflectors [1-2]. From these studies, PA inspection provided the best results, detecting nearly all of the flaws from the far side. These results were presented at the Fifth International Conference on NDE in Relation to Structural Integrity for Nuclear and Pressurised Components in 2006. This led to an invitation to examine field-removed specimens containing service-induced intergranular stress corrosion cracks (IGSCC) at the Electric Power Research Institutes (EPRI) Nondestructive Evaluation (NDE) Center, in Charlotte, North Carolina. Results from this activity are presented.

  10. Probabilistic assessment of critically flawed LMFBR PHTS piping elbows

    SciTech Connect (OSTI)

    Balkey, K.R.; Wallace, I.T.; Vaurio, J.K.

    1982-01-01T23:59:59.000Z

    One of the important functions of the Primary Heat Transport System (PHTS) of a large Liquid Metal Fast Breeder Reactor (LMFBR) plant is to contain the circulating radioactive sodium in components and piping routed through inerted areas within the containment building. A significant possible failure mode of this vital system is the development of cracks in the piping components. This paper presents results from the probabilistic assessment of postulated flaws in the most-critical piping elbow of each piping leg. The criticality of calculated maximum sized flaws is assessed against an estimated material fracture toughness to determine safety factors and failure probability estimates using stress-strength interference theory. Subsequently, a different approach is also employed in which the randomness of the initial flaw size and loading are more-rigorously taken into account. This latter approach yields much smaller probability of failure values when compared to the stress-strength interference analysis results.

  11. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  12. U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5.

  13. U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system.

  14. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  15. MaximumLetThrough.PDF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces andMapping the Nanoscale LandscapeImportsBG NorthMauro9 Maximum Let-Through

  16. V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    9: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August 28, 2013 -...

  17. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...

  18. V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...

    Broader source: Energy.gov (indexed) [DOE]

    8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis...

  19. V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...

    Broader source: Energy.gov (indexed) [DOE]

    4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

  20. Fabrication Flaw Density and Distribution In Repairs to Reactor Pressure Vessel and Piping Welds

    SciTech Connect (OSTI)

    GJ Schuster, FA Simonen, SR Doctor

    2008-04-01T23:59:59.000Z

    The Pacific Northwest National Laboratory is developing a generalized fabrication flaw distribution for the population of nuclear reactor pressure vessels and for piping welds in U.S. operating reactors. The purpose of the generalized flaw distribution is to predict component-specific flaw densities. The estimates of fabrication flaws are intended for use in fracture mechanics structural integrity assessments. Structural integrity assessments, such as estimating the frequency of loss-of-coolant accidents, are performed by computer codes that require, as input, accurate estimates of flaw densities. Welds from four different reactor pressure vessels and a collection of archived pipes have been studied to develop empirical estimates of fabrication flaw densities. This report describes the fabrication flaw distribution and characterization in the repair weld metal of vessels and piping. This work indicates that large flaws occur in these repairs. These results show that repair flaws are complex in composition and sometimes include cracks on the ends of the repair cavities. Parametric analysis using an exponential fit is performed on the data. The relevance of construction records is established for describing fabrication processes and product forms. An analysis of these records shows there was a significant change in repair frequency over the years when these components were fabricated. A description of repair flaw morphology is provided with a discussion of fracture mechanics significance. Fabrication flaws in repairs are characterized using optimized-access, high-sensitivity nondestructive ultrasonic testing. Flaw characterizations are then validated by other nondestructive evaluation techniques and complemented by destructive testing.

  1. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  2. Let's Move! Enjoy Moving as a Family

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    and employer.This material is partially funded by USDA's Supplemental Nutrition Assistance Program ­ SNAP which by the Expanded Food Nutrition Education Program, USDA, NIFA. Let's Move...Cold Weather Fun! Let's Move, Virginia Polytechnic Institute and State University, 2013 Virginia Cooperative Extension programs

  3. E-Print Network 3.0 - axial flaw detection Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    data mining for flaw identification in ceramics manufacture ORHAN DENGIZy, ALICE E. SMITH*y and IAN... elements is governed by its fracture strength, which is greatly...

  4. U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...

  5. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send...

    Broader source: Energy.gov (indexed) [DOE]

    Process Lets Local Users Send Spoofed Signals T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals June 23, 2011 - 4:49am Addthis PROBLEM:...

  6. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Broader source: Energy.gov (indexed) [DOE]

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  7. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

  8. U-240: Apple Remote Desktop Encryption Failure Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain...

  9. U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    0: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges November 9, 2011 - 8:30am...

  10. U-094: EMC Documentum Content Server Lets Local Administrative...

    Broader source: Energy.gov (indexed) [DOE]

    4: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated...

  11. V-235: Cisco Mobility Services Engine Configuration Error Lets...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login...

  12. Eddy current probe and method for flaw detection in metals

    DOE Patents [OSTI]

    Watjen, John P. (Sunnyvale, CA)

    1987-06-23T23:59:59.000Z

    A flaw detecting system is shown which includes a probe having a pair of ferrite cores with in-line gaps in close proximity to each other. An insulating, non-magnetic, non-conducting holder fills the gaps and supports the ferrite cores in a manner such that the cores form a generally V-shape. Each core is provided with an excitation winding and a detection winding. The excitation windings are connected in series or parallel with an rf port for connection thereof to a radio frequency source. The detection windings, which are differentially wound, are connected in series circuit to a detector port for connection to a voltage measuring instrument. The ferrite cores at the in-line gaps directly engage the metal surface of a test piece, and the probe is scanned along the test piece. In the presence of a flaw in the metal surface the detection winding voltages are unbalanced, and the unbalance is detected by the voltage measuring instrument. The insulating holder is provided with a profile which conforms to that of a prominent feature of the test piece to facilitate movement of the probe along the feature, typically an edge or a corner.

  13. Eddy current probe and method for flaw detection in metals

    DOE Patents [OSTI]

    Watjen, J.P.

    1987-06-23T23:59:59.000Z

    A flaw detecting system is shown which includes a probe having a pair of ferrite cores with in-line gaps in close proximity to each other. An insulating, non-magnetic, non-conducting holder fills the gaps and supports the ferrite cores in a manner such that the cores form a generally V-shape. Each core is provided with an excitation winding and a detection winding. The excitation windings are connected in series or parallel with an rf port for connection thereof to a radio frequency source. The detection windings, which are differentially wound, are connected in series circuit to a detector port for connection to a voltage measuring instrument. The ferrite cores at the in-line gaps directly engage the metal surface of a test piece, and the probe is scanned along the test piece. In the presence of a flaw in the metal surface the detection winding voltages are unbalanced, and the unbalance is detected by the voltage measuring instrument. The insulating holder is provided with a profile which conforms to that of a prominent feature of the test piece to facilitate movement of the probe along the feature, typically an edge or a corner. 9 figs.

  14. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  15. Fracture response of externally flawed aluminum cylindrical shells under internal gaseous detonation loading

    E-Print Network [OSTI]

    Barr, Al

    Fracture response of externally flawed aluminum cylindrical shells under internal gaseous. Experiments were performed to observe the fracture behavior of thin- wall and initially-flawed aluminum tubes to different fracture events are analyzed. Keywords: tube fracture, detonation, crack branching, crack curving

  16. Unspecified technologies | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExplorationUT-gTagusparkCalculator JumpUnited States:Delaware JumpNewfor

  17. Fabrication of specimens with controlled flaws for procedure development and personnel training and qualification

    SciTech Connect (OSTI)

    Edwards, R.L.; Watson, P.D.; Gruber, G.J. [Southwest Research Inst., San Antonio, TX (United States)

    1994-12-31T23:59:59.000Z

    Over the years, instances of service-induced flaws in vessel and piping components have prompted many utilities to acquire full-scale mockups to demonstrate the performance of nondestructive evaluation (NDE) procedures. Also, the newly invoked Appendix 8 requirement to the 1989 Section 11 ASME Code requires qualification of equipment, procedures, and personnel utilizing full-scale test specimens with actual flaws. This has increased the need for flaws that can be produced and accurately controlled in various test specimens. The typical service-induced flaws may consist of one of the following, depending on the material type and service conditions: mechanical fatigue; thermal fatigue; intergranular stress-corrosion (IGSC) cracking; and weld-induced flaws (during manufacture) such as slag, porosity, or incomplete fusion.

  18. U-255: Apache Wicket Input Validation Flaw Permits Cross-Site...

    Broader source: Energy.gov (indexed) [DOE]

    Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Apache Software Foundation Apache Wicket 1.5.5 Apache Software Foundation Apache Wicket 1.5-RC5.1 Apache...

  19. T-602: BlackBerry Enterprise Server Input Validation Flaw in...

    Broader source: Energy.gov (indexed) [DOE]

    02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation...

  20. Solar Decathlon 2013: Let the Building Begin | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    Solar Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin September 30, 2013 - 10:45am Addthis Day 7 Construction 1 of 22 Day 7 Construction During...

  1. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and...

  2. Development of flaw accept/reject criteria for solid propellant rocket grains

    E-Print Network [OSTI]

    Rotter, James Jerome

    1976-01-01T23:59:59.000Z

    /reject criteria for solid propellant rocket grains was developed and demonstrated' "State of the art" finite-element, viscoelasticity, and fracture mechanics methods were used to compute flaw criticality curves for a particular full , . cale grain geometry..., the technique demonstration motor (demo motor). These curves predict critical flaw geome- tries (centerbore cracks or internal cracks) for the demo motor under critical shrinkage and pressurization loads, The accuracy of the results was demonstrated...

  3. Effects of flaws on fracture behavior of structural ceramics

    SciTech Connect (OSTI)

    Singh, J.P.; Singh, D.; Sutaria, M.

    1996-05-01T23:59:59.000Z

    We evaluated the effects of fiber coating thickness, fiber orientation, and elevated temperature on flaw morphology and mechanical properties of Nicalon-fiber-reinforced SiC matrix composites with fiber cloth lay-up sequences of 0{degree}/45{degrees}, 0{degree}/20{degrees}/60{degrees}, and 0{degree}/40{degrees}/60{degrees} and fiber coating thicknesses of 0. 2 and 0.4{mu}m. For the three fiber cloth lay-up sequences (0{degree}/45{degrees}, 0{degree}/20{degrees}/60{degrees}, and 0{degree}/40{degrees}/60{degrees}), mechanical property (first matrix cracking stress, ultimate stress, and work of fracture) initially increase with coating thickness and reach peak values at a coating thickness of 0.2{mu}m. A further increase in coating thickness does not result in further improvements in mechanical properties; this is related to the role of coatings in protecting fibers from damage during composite processing. Measured values of strength and work-of- fracture of the above composites at elevated temperatures increased with temperature up to 1200{degrees}C, but decreased at higher temperatures. This decrease is correlated to in-situ fiber strength and fiber/matrix interface degradation. Correlations between model prediction and measured room-temperature ultimate strength of composites with 0{degree}45{degrees} and 0{degree}/40{degrees}/60{degrees} lay-up sequences were established by using in-situ fiber strength characteristics. The failure modes and degradation mechanisms in hot-gas filters and ceramic composite joints are being characterized by the mechanical and fractographic evaluation techniques established thus far. Correlations of these results with those of nondestructive evaluation can provide critical information for improved quality control.

  4. Predicting Flaw-Induced Resonance Spectrum Shift with Theoretical Perturbation Analysis

    SciTech Connect (OSTI)

    Lai, Canhai; Sun, Xin

    2013-10-28T23:59:59.000Z

    Resonance inspection is an emerging non-destructive evaluation (NDE) technique which uses the resonance spectra differences between the good part population and the flawed parts to identify anomalous parts. It was previously established that finite-element (FE)-based modal analysis can be used to predict the resonance spectrum for an engineering scale part with relatively good accuracy. However, FE-based simulations can be time consuming in examining the spectrum shifts induced by all possible structural flaws. This paper aims at developing a computationally efficient perturbation technique to quantify the frequency shifts induced by small structural flaws, based on the FE simulated resonance spectrum for the perfect part. A generic automotive connecting rod is used as the example part for our study. The results demonstrate that the linear perturbation theory provides a very promising way in predicting frequency changes induced by small structural flaws. As the flaw size increases, the discrepancy between the perturbation analysis and the actual FE simulation results increases due to nonlinearity, yet the perturbation analysis is still able to predict the right trend in frequency shift.

  5. Technical Letter Report Development of Flaw Size Distribution Tables Including Effects of Flaw Depth Sizing Errors for Draft 10CFR 50.61a (Alternate PTS Rule) JCN-N6398, Task 4

    SciTech Connect (OSTI)

    Simonen, Fredric A.; Gosselin, Stephen R.; Doctor, Steven R.

    2013-04-22T23:59:59.000Z

    This document describes a new method to determine whether the flaws in a particular reactor pressure vessel are consistent with the assumptions regarding the number and sizes of flaws used in the analyses that formed the technical justification basis for the new voluntary alternative Pressurized Thermal Shock (PTS) rule (Draft 10 CFR 50.61a). The new methodology addresses concerns regarding prior methodology because ASME Code Section XI examinations do not detect all fabrication flaws, they have higher detection performance for some flaw types, and there are flaw sizing errors always present (e.g., significant oversizing of small flaws and systematic under sizing of larger flaws). The new methodology allows direct comparison of ASME Code Section XI examination results with values in the PTS draft rule Tables 2 and 3 in order to determine if the number and sizes of flaws detected by an ASME Code Section XI examination are consistent with those assumed in the probabilistic fracture mechanics calculations performed in support of the development of 10 CFR 50.61a.

  6. U-130: JBoss Operations Network LDAP Authentication Bug Lets...

    Broader source: Energy.gov (indexed) [DOE]

    Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

  7. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...

    Broader source: Energy.gov (indexed) [DOE]

    Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

  8. U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges.

  9. Characterization of Service Induced Flaws on the Far Side of Austenitic Welds Using Phased Array Technology

    SciTech Connect (OSTI)

    Anderson, Michael T.; Cumblidge, Stephen E.

    2004-01-01T23:59:59.000Z

    Conventional ultrasonic testing methods continue to exhibit problems for applications involving coarse-grained structures. Pacific Northwest National Laboratory is evaluating the capabilities and limitations of phased array (PA) technology to detect service-type flaws in these coarse-grained materials. The work is being sponsored by the U.S. Nuclear Regulatory Commission, Office of Research. Work to determine detection capabilities through welds with varied grain structures is being explored to provide a better understanding of the acoustic properties of these welded structures. Piping specimens with welds fabricated in vertical and horizontal positions to simulate field conditions have been studied. The insights gained from the austenitic piping will be applied to dissimilar metal weld configurations, corrosion resistant clad piping and cast stainless steels. This paper presents results for using PA ultrasonic technology to determine the effectiveness of detecting and accurately characterizing flaws on the far-side of austenitic piping welds.

  10. One-sided infrared thermal imaging for flaw characterization of ceramic matrix composites

    SciTech Connect (OSTI)

    Deemer, C.; Sun, J. G.; Ellingson, W. A.

    2000-05-16T23:59:59.000Z

    One-sided infrared thermal imaging is being used to characterize voids and delamination in SiC/SiC composites. Flaw depth is estimated by examining the decay of surface temperature after application of a thermal pulse. Digital analysis of the surface temperature/time relationship allows characterization of the sizes and positions of defects. Results show that defects of various sizes and depths can be characterized in SiC/SiC composites with the technique.

  11. LET THE SUN SHINE: OPTIMAL DEPLOYMENT OF PHOTOVOLTAICS IN GERMANY

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    /kWh, depending on its location as well as on the size and type of PV system used (EPIA Report, 2011). InvestmentLET THE SUN SHINE: OPTIMAL DEPLOYMENT OF PHOTOVOLTAICS IN GERMANY Anna CRETI Jérôme JOAUG Cahier n:chantal.poujouly@polytechnique.edu hal-00751743,version1-14Nov2012 #12;Let the sun shine: optimal deployment of photovoltaics in Germany

  12. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...

    Broader source: Energy.gov (indexed) [DOE]

    63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

  13. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Broader source: Energy.gov (indexed) [DOE]

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  14. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

  15. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    719:Apache modproxyajp HTTP Processing Error Lets Remote Users Deny Service T-719:Apache modproxyajp HTTP Processing Error Lets Remote Users Deny Service September 16, 2011 -...

  16. U-044: HP Operations Agent and Performance Agent Lets Local Users...

    Broader source: Energy.gov (indexed) [DOE]

    4: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted...

  17. T-606: Sun Java System Access Manager Lets Remote Users Partially...

    Broader source: Energy.gov (indexed) [DOE]

    6: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

  18. U-178: VMware vMA Library Loading Error Lets Local Users Gain...

    Broader source: Energy.gov (indexed) [DOE]

    Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges...

  19. U-017: HP MFP Digital Sending Software Lets Local Users Obtain...

    Broader source: Energy.gov (indexed) [DOE]

    TRACETRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  20. Evaluation of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station

    SciTech Connect (OSTI)

    Anderson, Michael T.; Diaz, Aaron A.; Doctor, Steven R.

    2012-06-01T23:59:59.000Z

    During a recent inservice inspection (ISI) of a dissimilar metal weld (DMW) in an inlet (hot leg) steam generator nozzle at North Anna Power Station Unit 1, several axially oriented flaws went undetected by the licensee's manual ultrasonic testing (UT) technique. The flaws were subsequently detected as a result of outside diameter (OD) surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the DMW. Further ultrasonic tests were then performed, and a total of five axially oriented flaws, classified as primary water stress corrosion cracking (PWSCC), were detected in varied locations around the weld circumference.

  1. Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA.

    E-Print Network [OSTI]

    Immerman, Neil

    Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA. Let n = |Q|. Let w L(D) s.t. |w(D)) Pumping Lemma for Regular Sets #12;proof: Let w L(D), |w| n, w = w1, w2, . . . , wn · u w = w1 w2 w3, 2, . . . Pumping Lemma for Regular Sets #12;Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F

  2. Advanced Calculus 2 1. The derivative: Let Rm

    E-Print Network [OSTI]

    Logan, David

    , . . . , m). (9) We assume the transformation (9) to be invertible, that is, we can for the xj as functionsAdvanced Calculus 2 1. The derivative: Let Rm have components j and x: Rm Rn by x() = x1 matrix. You can think of A as a linear function taking Rm to Rm . We denote by AB the image of B under A

  3. To appear in The International Journal of Intelligent Automation and Soft Computing, 2003 Detection of Welding Flaws with MLP Neural Network and Case Based Reasoning

    E-Print Network [OSTI]

    Triantaphyllou, Evangelos

    Detection of Welding Flaws with MLP Neural Network and Case Based Reasoning T. Warren Liao1 *, E-Ze University, Nei-Li 32026, Chung-Li, Taiwan Abstract - The correct detection of welding flaws is important to the successful development of an automated weld inspection system. As a continuation of our previous efforts

  4. U-201: HP System Management Homepage Bugs Let Remote Users Deny...

    Broader source: Energy.gov (indexed) [DOE]

    01: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM:...

  5. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files...

    Broader source: Energy.gov (indexed) [DOE]

    7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011...

  6. T-671: Red Hat system-config-firewall Lets Local Users Gain Root...

    Broader source: Energy.gov (indexed) [DOE]

    1: Red Hat system-config-firewall Lets Local Users Gain Root Privileges T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges July 19, 2011 - 2:42pm Addthis...

  7. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following...

  8. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    48: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory June 16, 2011 -...

  9. T-721:Mac OS X Directory Services Lets Local Users View User...

    Broader source: Energy.gov (indexed) [DOE]

    1:Mac OS X Directory Services Lets Local Users View User Password Hashes T-721:Mac OS X Directory Services Lets Local Users View User Password Hashes September 20, 2011 - 8:45am...

  10. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...

    Office of Environmental Management (EM)

    71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

  11. U-071:HP Database Archiving Software Bugs Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

  12. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct...

  13. V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

  14. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Environmental Management (EM)

    165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May...

  15. T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    84: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm...

  16. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

  17. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs...

  18. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and...

    Broader source: Energy.gov (indexed) [DOE]

    4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain...

  19. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

  20. T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    99: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code August 23, 2011 - 3:35pm...

  1. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticat...

    Broader source: Energy.gov (indexed) [DOE]

    11: EMC CelerraVNXVNXe Access Control Bug Lets Remote Authenticated Users Access FilesDirectories U-211: EMC CelerraVNXVNXe Access Control Bug Lets Remote Authenticated Users...

  2. Fatigue flaw growth assessment and inclusion of stratification to the LBB assessment

    SciTech Connect (OSTI)

    Samohyl, P.

    1997-04-01T23:59:59.000Z

    The application of the LBB requires also fatigue flaw growth assessment. This analysis was performed for PWR nuclear power plants types VVER 440/230, VVER 440/213c, VVER 1000/320. Respecting that these NPP`s were designed according to Russian codes that differ from US codes it was needed to compare these approaches. Comparison with our experimental data was accomplished, too. Margins of applicability of the US methods and their modifications for the materials used for construction of Czech and Slovak NPP`s are shown. Computer code accomplishing the analysis according to described method is presented. Some measurement and calculations show that thermal stratifications in horizontal pipelines can lead to additive loads that are not negligible and can be dangerous. An attempt to include these loads induced by steady-state stratification was made.

  3. Joint Estimation of NDE Inspection Capability and Flaw-size Distribution for in-service Aircraft Inspections

    E-Print Network [OSTI]

    1 Joint Estimation of NDE Inspection Capability and Flaw- size Distribution for in-service Aircraft, Dayton, OH 45469 Abstract: Nondestructive evaluation (NDE) is widely used in the aerospace industry of unknown existing cracks is more difficult. If NDE signal strength is recorded at all inspections

  4. Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA.

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA. Let n = |Q|. Let w L(D) s.t. |w: Pumping Lemma CS250: Discrete Math for Computer Science #12;proof: Let w L(D), |w| n, w = w1, w2 F Thus, xykz L(D) for k = 0, 1, 2, . . . L30: Pumping Lemma CS250: Discrete Math for Computer

  5. Fracture assessment of HSST Plate 14 shallow-flaw cruciform bend specimens tested under biaxial loading conditions

    SciTech Connect (OSTI)

    Bass, B.R.; McAfee, W.J.; Williams, P.T.; Pennell, W.E.

    1998-06-01T23:59:59.000Z

    A technology to determine shallow-flaw fracture toughness of reactor pressure vessel (RPV) steels is being developed for application to the safety assessment of RPVs containing postulated shallow surface flaws. Matrices of cruciform beam tests were developed to investigate and quantify the effects of temperature, biaxial loading, and specimen size on fracture initiation toughness of two-dimensional (constant depth), shallow, surface flaws. The cruciform beam specimens were developed at Oak Ridge National Laboratory (ORNL) to introduce a far-field, out-of-plane biaxial stress component in the test section that approximates the nonlinear stresses resulting from pressurized-thermal-shock or pressure-temperature loading of an RPV. Tests were conducted under biaxial load ratios ranging from uniaxial to equibiaxial. These tests demonstrated that biaxial loading can have a pronounced effect on shallow-flaw fracture toughness in the lower transition temperature region for an RPV material. The cruciform fracture toughness data were used to evaluate fracture methodologies for predicting the observed effects of biaxial loading on shallow-flaw fracture toughness. Initial emphasis was placed on assessment of stress-based methodologies, namely, the J-Q formulation, the Dodds-Anderson toughness scaling model, and the Weibull approach. Applications of these methodologies based on the hydrostatic stress fracture criterion indicated an effect of loading-biaxiality on fracture toughness; the conventional maximum principal stress criterion indicated no effect. A three-parameter Weibull model based on the hydrostatic stress criterion is shown to correlate the experimentally observed biaxial effect on cleavage fracture toughness by providing a scaling mechanism between uniaxial and biaxial loading states.

  6. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  7. Threshold LET for SEU induced by low energy ions

    SciTech Connect (OSTI)

    McNulty, P.J.; Roche, P.; Palau, J.M.; Gasiot, J.

    1999-12-01T23:59:59.000Z

    Simulations to determine the threshold LET as a function of the length of the ion track are consistent with there being two regions of charge collection. In the top layer which contains the depletion region all the charge generated is collected in time to upset the device. In the next layer, 10% to 20% of the charge generated is collected and contributes to upsetting the device. This second layer of partial charge collection may significantly impact the accuracy of SEU predictions involving low-energy neutrons and protons. A simple method of including this contribution in calculations is proposed.

  8. Solar Decathlon 2015: Let the Competition Begin | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSite CulturalDepartment ofat HomeAssurance:Designing theMeet5: Let

  9. U-021: Cisco Unified Communications Manager Directory Traversal...

    Broader source: Energy.gov (indexed) [DOE]

    1: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote...

  10. 1. Jordan Lemma Let R0 be a positive number and a a real number with |a| < R0. Let

    E-Print Network [OSTI]

    Milicic, Dragan

    = R -(R) (R) e-mR sin f(Rei ) d R max z R |f(z)| -(R) (R) e-mR sin d R max z R |f(z)| 0 e-mR sin d = 2R max z R |f(z)| 2 0 e-mR sin d. Now we use the following simple lemma. 1.2. Lemma. Let [0 e- 2mR 2 0 = 2mR 1 - e-mR 2mR . Combining this with the above we get R eimz f(z) dz m max z

  11. Automated Flaw Detection Scheme For Cast Austenitic Stainless Steel Weld Specimens Using Hilbert Huang Transform Of Ultrasonic Phased Array Data

    SciTech Connect (OSTI)

    Khan, T.; Majumdar, Shantanu; Udpa, L.; Ramuhalli, Pradeep; Crawford, Susan L.; Diaz, Aaron A.; Anderson, Michael T.

    2012-01-01T23:59:59.000Z

    The objective of this work is to develop processing algorithms to detect and localize the flaws using NDE ultrasonic data. Data was collected using cast austenitic stainless steel (CASS) weld specimens on-loan from the U.S. nuclear power industrys Pressurized Water Reactor Owners Group (PWROG) specimen set. Each specimen consists of a centrifugally cast stainless steel (CCSS) pipe section welded to a statically cast (SCSS) or wrought (WRSS) section. The paper presents a novel automated flaw detection and localization scheme using low frequency ultrasonic phased array inspection signals in the weld and heat affected zone of the base materials. The major steps of the overall scheme are preprocessing and region of interest (ROI) detection followed by the Hilbert Huang transform (HHT) of A-scans in the detected ROIs. HHT offers time-frequency-energy distribution for each ROI. The accumulation of energy in a particular frequency band is used as a classification feature for the particular ROI.

  12. Effects of high-temperature environments on flaw generation and fracture behavior of SiC/SiC composites

    SciTech Connect (OSTI)

    Singh, J.P.; Singh, D. [Argonne National Lab., IL (United States). Energy Technology Div.

    1995-02-01T23:59:59.000Z

    Flaw generation and fracture behavior of Nicalon-fiber-reinforced SiC matrix composites are influenced by high temperatures. Therefore, the authors evaluated the effects of temperature by measuring the strength of these composites at several temperatures ranging from 800 to 1,300 C, and by characterizing their microstructure. While composite strength increased from {approx}400 MPa at room temperature to {approx}532 MPa at 800 C, it decreased to {approx}270 MPa at 1,300 C. Such degradation of composite strength at high temperature is believed to be partly due to fiber degradation. In-situ fiber strength of composites tested at room and elevated temperatures was estimated by fractographic techniques. The in-situ strength of fibers in composites was significantly lower than that of as-received fibers. This decrease is believed to be related to flaws that develop during processing and to exposure to elevated-temperature service environments.

  13. Technical basis for flawed cylinder test specification to assure adequate fracture resistance of ISO high strength steel cylinder

    SciTech Connect (OSTI)

    Rana, M.D. [Praxair, Inc., Tonawanda, NY (United States). Process and Systems R and D; Smith, J.H. [National Inst. of Standards and Technology, Gaithersburg, MD (United States). Metallurgy Div.; Tribolet, R.O.

    1996-12-01T23:59:59.000Z

    High pressure industrial gases (such as oxygen, nitrogen, argon, hydrogen, etc.) are stored and transported in portable cylinders. ISO TC58 SC3 has developed a draft specification 9809 for design and fabrication of high pressure cylinders with maximum tensile strength limitation of 1,100 N/mm{sup 2}. In order to extend the ISO 9809 rules for higher than 1,100 N/mm{sup 2} strength level cylinders, a working group WG14 was formed in 1989 to develop new rules to assure adequate fracture resistance. In 1994, WG14 recommended a simple, but unique flawed cylinder test method for design qualification of the cylinder and acceptance criteria to assure adequate fracture resistance. WG14 also recommended Charpy-V-Notch impact tests to control the required fracture resistance on production cylinders. This paper presents the technical basis that was employed in developing the flawed cylinder test method and acceptance criteria. The specification was developed for seamless steel cylinders having actual strength in the range of 1,100 to 1,400 N/mm{sup 2} and cylindrical section wall thickness in the range of 3mm to 10mm. Flawed cylinder tests were conducted on several hundred cylinders of varying sizes and strength levels. The specification requires to demonstrate LEAK-BEFORE-BREAK performance of the cylinder having flaw length equal to 1.6(O.D. {times} t{sub design}){sup 0.5} at failure pressure = (t{sub design}/t{sub actual}) {times} Design Pressure.

  14. Technical basis for flawed cylinder test specification to assure adequate fracture resistance of ISO high-strength steel cylinder

    SciTech Connect (OSTI)

    Rana, M.D. [Praxair, Inc., Tonawanda, NY (United States); Smith, J.H. [National Inst. of Standards and Technology, Gaithersburg, MD (United States). Metallurgy Div.; Tribolet, R.O. [Tribolet (R.O.), Van Wert, OH (United States)

    1997-11-01T23:59:59.000Z

    High-pressure industrial gases (such as oxygen, nitrogen, argon, hydrogen, etc.) are stored and transported in portable cylinders. ISO TC58 SC3 has developed a draft specification 9809 for design and fabrication of high-pressure cylinders with maximum tensile strength limitation of 1,100 N/mm{sup 2}. In order to extend the ISO 9809 rules for higher than 1,100 N/mm{sup 2} strength level cylinders, a working group WG14 was formed in 1989 to develop new rules to assure adequate fracture resistance. In 1994, WG14 recommended a simple, but unique flawed cylinder test method for design qualification of the cylinder and acceptance criteria to assure adequate fracture resistance. WG14 also recommended Charpy-V-notch impact tests to control the required fracture resistance on production cylinders. This paper presents the technical basis that was employed in developing the flawed cylinder test method and acceptance criteria. The specification was developed for seamless steel cylinders having actual strength in the range of 1,100 to 1,400 N/mm{sup 2} and cylindrical section wall thickness in the range of 3 to 10 mm. Flawed cylinder tests were conducted on several hundred cylinders of varying sizes and strength levels. The specification requires to demonstrate LEAK-BEFORE-BREAK performance of the cylinder having flaw length equal to 1.6 (o.d. {times} t{sub design}){sup 0.5} at failure pressure = (t{sub design}/t{sub actual}) x Design Pressure.

  15. Dilatation-strain analysis of the effects of flaws on the mechanical behavior of a highly filled elastomer

    E-Print Network [OSTI]

    Smith, Benjamin Ray

    2012-06-07T23:59:59.000Z

    DILATATION-STRAIN ANALYSIS OF THE EFFECTS OF FLANS ON THE MECHANICAL BEHAVIOR OF A HIGHLY FILLED ELASTOMER A Thesis By BENJAMIN RAY SMITH Submitted to the Graduate College of the Texas A&M University in partial fulfillment... of the requirements for the degree of MASTER OF SCIENCE August 1966 Major Subject. 'Aerospace Engineering DILATATION-STRAIN ANALYSIS OF THE EFFECTS OF FLAWS ON THE MECHANICAL BEHAVIOR OF A HIGHLY FILLED ELASTOMER A Thesis By BENJAMIN RAY SMITH Approved...

  16. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Broader source: Energy.gov (indexed) [DOE]

    Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

  17. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222:...

  18. V-010: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    The vendor has issued a fix for some affected products. Addthis Related Articles U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive...

  19. DEVELOPMENT AND APPLICATION OF MATERIALS PROPERTIES FOR FLAW STABILITY ANALYSIS IN EXTREME ENVIRONMENT SERVICE

    SciTech Connect (OSTI)

    Sindelar, R; Ps Lam, P; Andrew Duncan, A; Bruce Wiersma, B; Karthik Subramanian, K; James Elder, J

    2007-04-18T23:59:59.000Z

    Discovery of aging phenomena in the materials of a structure may arise after its design and construction that impact its structural integrity. This condition can be addressed through a demonstration of integrity with the material-specific degraded conditions. Two case studies of development of fracture and crack growth property data, and their application in development of in-service inspection programs for nuclear structures in the defense complex are presented. The first case study covers the development of fracture toughness properties in the form of J-R curves for rolled plate Type 304 stainless steel with Type 308 stainless steel filler in the application to demonstrate the integrity of the reactor tanks of the heavy water production reactors at the Savannah River Site. The fracture properties for the base, weld, and heat-affected zone of the weldments irradiated at low temperatures (110-150 C) up to 6.4 dpa{sub NRT} and 275 appm helium were developed. An expert group provided consensus for application of the irradiated properties for material input to acceptance criteria for ultrasonic examination of the reactor tanks. Dr. Spencer H. Bush played a lead advisory role in this work. The second case study covers the development of fracture toughness for A285 carbon steel in high level radioactive waste tanks. The approach in this case study incorporated a statistical experimental design for material testing to address metallurgical factors important to fracture toughness. Tolerance intervals were constructed to identify the lower bound fracture toughness for material input to flaw disposition through acceptance by analysis.

  20. A Proposal for the Maximum KIC for Use in ASME Code Flaw and Fracture Toughness Evaluations

    SciTech Connect (OSTI)

    Kirk, Mark [NRC; Stevens, Gary [U.S. Nuclear Regulatory Commission; Erickson, Marjorie A [ORNL; Yin, Shengjun [ORNL

    2011-01-01T23:59:59.000Z

    Nonmandatory Appendices A [1] and G [2] of Section XI of the ASME Code use the KIc curve (indexed to the material reference transition temperature, RTNDT) in reactor pressure vessel (RPV) flaw evaluations, and for the purpose of establishing RPV pressure-temperature (P-T) limits. Neither of these appendices places an upper-limit on the KIc value that may be used in these assessments. Over the years, it has often been suggested by some of the members of the ASME Section XI Code committees that are responsible for maintaining Appendices A and G that there is a practical upper limit of 200 ksi in (220 MPa m) [4]. This upper limit is not well recognized by all users of the ASME Code, is not explicitly documented within the Code itself, and the one source known to the authors where it is defended [4] relies on data that is either in error, or is less than 220 MPa m. However, as part of the NRC/industry pressurized thermal shock (PTS) re-evaluation effort, empirical models were developed that propose common temperature dependencies for all ferritic steels operating on the upper shelf. These models relate the fracture toughness properties in the transition regime to those on the upper shelf and, combined with data for a wide variety of RPV steels and welds on which they are based, suggest that the practical upper limit of 220 MPa m exceeds the upper shelf fracture toughness of most RPV steels by a considerable amount, especially for irradiated steels. In this paper, available models and data are used to propose upper bound limits of applicability on the KIc curve for use in ASME Code, Section XI, Nonmandatory Appendices A and G evaluations that are consistent with available data for RPV steels.

  1. Debate response: Which rate designs provide revenue stability and efficient price signals? Let the debate continue.

    SciTech Connect (OSTI)

    Boonin, David Magnus

    2009-11-15T23:59:59.000Z

    Let's engage in further discussion that provides solutions and details, not just criticisms and assertions. Let's engage in a meaningful dialogue about the conditions where real-time pricing or critical peak pricing with decoupling or the SFV rate design with a feebate is most effective. (author)

  2. Assessment of strength limiting flaws in ceramic heat exchanger components: Phase 1, Final report, September 28, 1984-June 30, 1986

    SciTech Connect (OSTI)

    Powers, T.; Snyder, J.

    1986-10-01T23:59:59.000Z

    Assurance of energy efficient design lifetimes of high temperature structural ceramics requires the ability to specify acceptance criteria and to test to those criteria. These criteria will be established through nondestructive testing, to determine which defects are detectable, together with fracture mechanics, to calculate effects of indetectable flaws. The first phase of this program is to examine heat exchanger material with four test methods which have shown promise for use in ceramics; ultrasonic scanning, microfocus x-ray, Scanning Laser Acoustic Microscope, and Acoustic Holography. The capabilities, limits, and potential for improvement of these are presented in this report. Destructive testing, material sectioning, and fractography are included. 24 refs., 68 figs., 6 tabs.

  3. Electromagnetic methods for measuring materials properties of cylindrical rods and array probes for rapid flaw inspection

    SciTech Connect (OSTI)

    Sun, Haiyan

    2005-05-01T23:59:59.000Z

    The case-hardening process modifies the near-surface permeability and conductivity of steel, as can be observed through changes in alternating current potential drop (ACPD) along a rod. In order to evaluate case depth of case hardened steel rods, analytical expressions are derived for the alternating current potential drop on the surface of a homogeneous rod, a two-layered and a three-layered rod. The case-hardened rod is first modeled by a two-layer rod that has a homogeneous substrate with a single, uniformly thick, homogeneous surface layer, in which the conductivity and permeability values differ from those in the substrate. By fitting model results to multi-frequency ACPD experimental data, estimates of conductivity, permeability and case depth are found. Although the estimated case depth by the two-layer model is in reasonable agreement with the effective case depth from the hardness profile, it is consistently higher than the effective case depth. This led to the development of the three-layer model. It is anticipated that the new three-layered model will improve the results and thus makes the ACPD method a novel technique in nondestructive measurement of case depth. Another way to evaluate case depth of a case hardened steel rod is to use induction coils. Integral form solutions for an infinite rod encircled by a coaxial coil are well known, but for a finite length conductor, additional boundary conditions must be satisfied at the ends. In this work, calculations of eddy currents are performed for a two-layer conducting rod of finite length excited by a coaxial circular coil carrying an alternating current. The solution is found using the truncated region eigenfunction expansion (TREE) method. By truncating the solution region to a finite length in the axial direction, the magnetic vector potential can be expressed as a series expansion of orthogonal eigenfunctions instead of as a Fourier integral. Closed-form expressions are derived for the electromagnetic field in the presence of a finite a two-layer rod and a conductive tube. The results are in very good agreement with those obtained by using a 2D finite element code. In the third part, a new probe technology with enhanced flaw detection capability is described. The new probe can reduce inspection time through the use of multiple Hall sensors. A prototype Hall array probe has been built and tested with eight individual Hall sensor ICs and a racetrack coil. Electronic hardware was developed to interface the probes to an oscilloscope or an eddy current instrument. To achieve high spatial resolution and to limit the overall probe size, high-sensitivity Hall sensor arrays were fabricated directly on a wafer using photolithographic techniques and then mounted in their unencapsulated form. The electronic hardware was then updated to interface the new probes to a laptop computer.

  4. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  5. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat...

  6. THE C*-ALGEBRA OF A VECTOR BUNDLE 1. Introduction Let E ...

    E-Print Network [OSTI]

    2010-07-19T23:59:59.000Z

    Jul 19, 2010 ... If B/J is nuclear then it is C(X)-nuclear and since CJ is KKX-contractible it follows that must be a KKX-equivalence, see [2]. Let us recall that...

  7. U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...

    Broader source: Energy.gov (indexed) [DOE]

    information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

  8. T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially...

    Broader source: Energy.gov (indexed) [DOE]

    of service. Solution: Pidgin has issued a fix (2.10.0). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

  9. V-002: EMC NetWorker Module for Microsoft Applications Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications...

  10. Genomic instability and bystander effects induced by high-LET radiation Eric J Hall*,1

    E-Print Network [OSTI]

    Genomic instability and bystander effects induced by high-LET radiation Eric J Hall*,1 and Tom K. There is a progressive increase in genomic instability, determined either by gene amplification or allelic imbalance

  11. Let A be any language. Define the right-equivalence relation A on

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    = {a, b}; A1 = w #b(w) 0 (mod 2) L34: Myhill-Nerode Theorem CS250: Discrete Math for Computer Science #12;x A y w (xw A yw A) Let = {a, b}; A1 = w #b(w) 0 (mod 2) A1 a b A1 ab L34: Myhill-Nerode Theorem CS250: Discrete Math for Computer Science #12;x A y w (xw A yw A) Let = {a, b}; A1 = w #b

  12. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  13. U-052: HP Protect Tools Device Access Manager Unspecified Bug...

    Broader source: Energy.gov (indexed) [DOE]

    PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP...

  14. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption...

    Broader source: Energy.gov (indexed) [DOE]

    versions 8.2.5 and prior Acrobat Professional Extended versions 9.4.1 and prior Acrobat 3D versions 8.2.5 and prior Adobe Flash Player versions 10.2.159.1 and prior for Windows,...

  15. T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...

    Broader source: Energy.gov (indexed) [DOE]

    has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

  16. Progress in evaluation and improvement in nondestructive examination reliability for inservice inspection of Light Water Reactors (LWRs) and characterize fabrication flaws in reactor pressure vessels

    SciTech Connect (OSTI)

    Doctor, S.R.; Bowey, R.E.; Good, M.S.; Friley, J.R.; Kurtz, R.J.; Simonen, F.A.; Taylor, T.T.; Heasler, P.G.; Andersen, E.S.; Diaz, A.A.; Greenwood, M.S.; Hockey, R.L.; Schuster, G.J.; Spanner, J.C.; Vo, T.V.

    1991-10-01T23:59:59.000Z

    This paper is a review of the work conducted under two programs. One (NDE Reliability Program) is a multi-year program addressing the reliability of nondestructive evaluation (NDE) for the inservice inspection (ISI) of light water reactor components. This program examines the reliability of current NDE, the effectiveness of evolving technologies, and provides assessments and recommendations to ensure that the NDE is applied at the right time, in the right place with sufficient effectiveness that defects of importance to structural integrity will be reliably detected and accurately characterized. The second program (Characterizing Fabrication Flaws in Reactor Pressure Vessels) is assembling a data base to quantify the distribution of fabrication flaws that exist in US nuclear reactor pressure vessels with respect to density, size, type, and location. These programs will be discussed as two separate sections in this report. 4 refs., 7 figs.

  17. Final Assessment of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station

    SciTech Connect (OSTI)

    Anderson, Michael T.; Diaz, Aaron A.; Cinson, Anthony D.; Crawford, Susan L.; Prowant, Matthew S.; Doctor, Steven R.

    2014-03-24T23:59:59.000Z

    PNNL conducted a technical assessment of the NDE issues and protocols that led to missed detections of several axially oriented flaws in a steam generator primary inlet dissimilar metal weld at North Anna Power Station, Unit 1 (NAPS-1). This particular component design exhibits a significant outside-diameter (OD) taper that is not included as a blind performance demonstration mock-up within the industrys Performance Demonstration Initiative, administered by EPRI. For this reason, the licensee engaged EPRI to assist in the development of a technical justification to support the basis for a site-specific qualification. The service-induced flaws at NAPS-1 were eventually detected as a result of OD surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the dissimilar metal weld. A total of five axially oriented flaws were detected in varied locations around the weld circumference. The field volumetric examination that was conducted at NAPS-1 was a non-encoded, real-time manual ultrasonic examination. PNNL conducted both an initial assessment, and subsequently, a more rigorous technical evaluation (reported here), which has identified an array of NDE issues that may have led to the subject missed detections. These evaluations were performed through technical reviews and discussions with NRC staff, EPRI NDE Center personnel, industry and ISI vendor personnel, and ultrasonic transducer manufacturers, and laboratory tests, to better understand the underlying issues at North Anna.

  18. Electrophoretically active sol-gel processes to backfill, seal, and/or densify porous, flawed, and/or cracked coatings on electrically conductive material

    DOE Patents [OSTI]

    Panitz, Janda K. (Sandia Park, NM); Reed, Scott T. (Albuquerque, NM); Ashley, Carol S. (Albuquerque, NM); Neiser, Richard A. (Albuquerque, NM); Moffatt, William C. (Albuquerque, NM)

    1999-01-01T23:59:59.000Z

    Electrophoretically active sol-gel processes to fill, seal, and/or density porous, flawed, and/or cracked coatings on electrically conductive substrates. Such coatings may be dielectrics, ceramics, or semiconductors and, by the present invention, may have deposited onto and into them sol-gel ceramic precursor compounds which are subsequently converted to sol-gel ceramics to yield composite materials with various tailored properties.

  19. Electrophoretically active sol-gel processes to backfill, seal, and/or densify porous, flawed, and/or cracked coatings on electrically conductive material

    DOE Patents [OSTI]

    Panitz, J.K.; Reed, S.T.; Ashley, C.S.; Neiser, R.A.; Moffatt, W.C.

    1999-07-20T23:59:59.000Z

    Electrophoretically active sol-gel processes to fill, seal, and/or density porous, flawed, and/or cracked coatings on electrically conductive substrates. Such coatings may be dielectrics, ceramics, or semiconductors and, by the present invention, may have deposited onto and into them sol-gel ceramic precursor compounds which are subsequently converted to sol-gel ceramics to yield composite materials with various tailored properties. 6 figs.

  20. A FRAMEWORK TO DEVELOP FLAW ACCEPTANCE CRITERIA FOR STRUCTURAL INTEGRITY ASSESSMENT OF MULTIPURPOSE CANISTERS FOR EXTENDED STORAGE OF USED NUCLEAR FUEL

    SciTech Connect (OSTI)

    Lam, P.; Sindelar, R.; Duncan, A.; Adams, T.

    2014-04-07T23:59:59.000Z

    A multipurpose canister (MPC) made of austenitic stainless steel is loaded with used nuclear fuel assemblies and is part of the transfer cask system to move the fuel from the spent fuel pool to prepare for storage, and is part of the storage cask system for on-site dry storage. This weld-sealed canister is also expected to be part of the transportation package following storage. The canister may be subject to service-induced degradation especially if exposed to aggressive environments during possible very long-term storage period if the permanent repository is yet to be identified and readied. Stress corrosion cracking may be initiated on the canister surface in the welds or in the heat affected zone because the construction of MPC does not require heat treatment for stress relief. An acceptance criteria methodology is being developed for flaw disposition should the crack-like defects be detected by periodic Inservice Inspection. The external loading cases include thermal accident scenarios and cask drop conditions with the contribution from the welding residual stresses. The determination of acceptable flaw size is based on the procedure to evaluate flaw stability provided by American Petroleum Institute (API) 579 Fitness-for-Service (Second Edition). The material mechanical and fracture properties for base and weld metals and the stress analysis results are obtained from the open literature such as NUREG-1864. Subcritical crack growth from stress corrosion cracking (SCC), and its impact on inspection intervals and acceptance criteria, is not addressed.

  1. Device Lets Monkey's Brain Move Robot Arm Research could one day aid amputees or paralysis victims

    E-Print Network [OSTI]

    Schwartz, Andrew

    Device Lets Monkey's Brain Move Robot Arm Research could one day aid amputees or paralysis victims successfully wired monkey brains to robot arms, raising hope that science is moving closer to finding ways to help paralyzed people control their world. Using their brains to control their robot arms, monkeys

  2. Adriano Galati Christian Olms Jonathan Haber Kasia Warpas ... let it rain

    E-Print Network [OSTI]

    Subramanian, Sriram

    Adriano Galati Christian Olms Jonathan Haber Kasia Warpas ... let it rain Tuesday, 12 July 2011 #12@cs.nott.ac.uk christian.olms@stud.uni-due.de jonhaber@gmail.com kasia.warpas@gmail.com Tuesday, 12 July 2011 #12;

  3. International Journal of Robotics Research, In Press Let Them Fall Where They May

    E-Print Network [OSTI]

    Jaffe, Jules

    International Journal of Robotics Research, In Press Let Them Fall Where They May: Capture Regions is considered which has useful application in automatic robot planning and the design of parts feeders. When resting aspects (Boothroyd, Redford, Poli & Murch 1972)) is useful for many tasks in robotic

  4. Which research in design creativity and innovation? Let us not forget the reality of companies

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Which research in design creativity and innovation? Let us not forget the reality of companies Bernard Yannou Professor of Design & Industrial Engineering Laboratoire Genie Industriel Ecole Centrale design creativity and innovation from practical perspectives for companies requires both a good

  5. Energy Policy 33 (2005) 18251832 Letting the (energy) Gini out of the bottle: Lorenz curves of

    E-Print Network [OSTI]

    Kammen, Daniel M.

    Energy Policy 33 (2005) 1825­1832 Letting the (energy) Gini out of the bottle: Lorenz curves of cumulative electricity consumption and Gini coefficients as metrics of energy distribution and equity Arne Jacobsona , Anita D. Milmana , Daniel M. Kammena,b, * a Energy and Resources Group, University of California

  6. WE INVEST IN TECHNOLOGY. NOW LET US INVEST IN YOU. Leap Technology Program

    E-Print Network [OSTI]

    Virginia Tech

    WE INVEST IN TECHNOLOGY. NOW LET US INVEST IN YOU. Leap Technology Program Fidelity Investments innovation, and effective deployment of leading-edge technologies. Our entry-level technology training, Quality Assurance, Mainframe Development and Technology Infrastructure and Engineering (TIE). Upon

  7. Let the Experts Guide the Use of Simulation Software Georg Reichard1

    E-Print Network [OSTI]

    for easy preparation and presentation of integrated help screens, guiding users through the use1 INSTRUCTOR Let the Experts Guide the Use of Simulation Software Georg Reichard1 , Adil Al-Mumin2 curve by understanding the impact of decisions made during the input/design process. Keywords. Software

  8. Development of nondestructive evaluation methods and prediction of effects of flaws on the fracture behavior of structural ceramics

    SciTech Connect (OSTI)

    Ellingson, W.A.; Singh, J.P.; Sivers, E.A. [and others

    1995-04-01T23:59:59.000Z

    Continuous fiber ceramic matrix composites are being developed for turbine engine components, heat exchangers, and hot-gas filters in fossil energy systems. Reliable application requires nondestructive evaluation (NDE) methods that provide data for quality assurance and inputs to life time prediction models and that aid in process development. NDE developments at Argonne have focused on methods to assess density distribution, fiber orientation (for mechanical properties), and defect detection in both SiC/SiC and A1{sub 2}O{sub 3}/A1{sub 2}O{sub 3} materials. and that also assess the chemical state at fiber/matrix interfaces. 2-D cloth lay-up and 3-D weave CVI-infiltrated SiC/SiC specimens were studied by X-ray imaging methods now under development. Microfocus X-ray computerized tomography (MXCT) methods are being developed to provide these data. Multinuclear Nuclear Magnetic Resonance spectroscopy (13C, 29Si, and 11B) is under development for quantizing B content at fiber/matrix interfaces. Magic angle spinning techniques on SiC/SiC specimens with different coating thicknesses showed that quantification of B at the Interface is achievable. NDE data are being coupled to room- and elevated-temperature fracture studies to evaluate effects of fiber orientation and fiber coating thickness on resulting flaw morphology and mechanical properties of Nicalon-fiber-reinforced SiC matrix composites. Specifically, composites with fiber cloth lay-up sequences of varying coating thicknesses were evaluated. For room-temperature mechanical evaluation, composites with carbon-fiber coating thicknesses of 0 and 0.2 {mu}m were used, while elevated-temperature studies used composites with a coating thickness of 0.4 {mu}m. Composites with uncoated fibers failed in a brittle mode, while composites with 0.2 {mu}m fiber coating showed noncatastrophic failure.

  9. Development of nondestructive evaluation methods and prediction of effects of flaws on the fracture behavior of structural ceramics

    SciTech Connect (OSTI)

    Ellingson, W.A.; Singh, J.P.; Holloway, D.L.; Dieckman, S.L.; Singh, D.; Sivers, E.A.

    1993-03-01T23:59:59.000Z

    Work emphasized continuous-fiber ceramic matrix composites (CFCCs) with 2-D lay-ups composed of chemical-vapor-infiltrated (CVI) SiC/SiC materials, mostly made of Nicalon plain weave with 16 [times] 16 tows/in. One sample examined comprised a 3-D SiC/SiC braid made by Techniweave. Using a new 1024[times]1024[times]14 bit detector, images from 3-D X-ray CT data with pixel sizes of <140 [mu]m and 2-D fast-Fourier transform (FFT) image processing, we have shown that fiber orientations can be measured to [plus minus]2-1/2[degree]. 3-D FFT analysis was used to determine 3-D braid/weave fiber spacing. Multinuclear ([sup l]H, [sup 13]C, and [sup 29]Si) NMR spectroscopy, is being studied. Surface chemistry of fibers and chemistry of interfacial regions in composites are being studied. We are also conducting initial studies to investigate the bulk composition of matrix materials ([alpha], [beta], amorphous phase, silica, and oxynitride concentration) and surface chemistry of Si[sub 3]N[sub 4] and SiC fibers. Fracture mechanics work to correlate with NDE data focused on strength distribution of as-fabricated Nicalon fibers obtained from bundle tests. Strength distribution of fractured Nicalon fibers in composites was assessed from fracture mirror radii. SEM was used to determine distribution of fiber pullout length distribution for fibers in composites, for their strength distribution. From the strength distribution plots, scale parameters were determined to be 3.45 GPa for as-fabricated fibers and 1.31 GPa for fibers in processed composites. However, the Weibull moduli for the two distributions were similar. Reduction in strength of the fibers in processed composites is believed to be due to surface flaws and defects. Effects of fiber misorientation on mechanical properties of NDE-tested CVI continuous-fiber composites are currently being investigated. 8 figs, 11 refs.

  10. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    17, 2012 U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact A number of security vulnerabilities have been identified in the management web...

  11. Stochastic modeling of the cell killing effect for low- and high-LET radiation

    E-Print Network [OSTI]

    Partouche, Julien

    2005-02-17T23:59:59.000Z

    the cell nucleus; and insiders, secondary particles initiated and stopping inside the cell nucleus............................................................................25 FIG. 8. Lineal energy distribution for a spherical tissue region of one... LET, or lineal energy (its microscopic equivalent) is usually used to describe the energy deposition within a site of interest. The lineal energy, y, is the energy deposited per unit length, and is defined as the quotient of ? by l , where...

  12. Aneuploidy: Cancer's Fatal Flaw?

    E-Print Network [OSTI]

    Williams, Bret R.

    Aneuploidy is a characteristic of cancer, with greater than 90% of all solid tumors in humans carrying an aberrant karyotype. Yet, whether or how this condition contributes to tumorigenesis is not understood. Here we ...

  13. Development of nondestructive evaluation methods and prediction of effects of flaws on the fracture behavior of structural ceramics

    SciTech Connect (OSTI)

    Ellingson, W.A.; Singh, J.P.; Holloway, D.L.; Dieckman, S.L.; Singh, D.; Sivers, E.A.

    1993-03-01T23:59:59.000Z

    Work emphasized continuous-fiber ceramic matrix composites (CFCCs) with 2-D lay-ups composed of chemical-vapor-infiltrated (CVI) SiC/SiC materials, mostly made of Nicalon plain weave with 16 {times} 16 tows/in. One sample examined comprised a 3-D SiC/SiC braid made by Techniweave. Using a new 1024{times}1024{times}14 bit detector, images from 3-D X-ray CT data with pixel sizes of <140 {mu}m and 2-D fast-Fourier transform (FFT) image processing, we have shown that fiber orientations can be measured to {plus_minus}2-1/2{degree}. 3-D FFT analysis was used to determine 3-D braid/weave fiber spacing. Multinuclear ({sup l}H, {sup 13}C, and {sup 29}Si) NMR spectroscopy, is being studied. Surface chemistry of fibers and chemistry of interfacial regions in composites are being studied. We are also conducting initial studies to investigate the bulk composition of matrix materials ({alpha}, {beta}, amorphous phase, silica, and oxynitride concentration) and surface chemistry of Si{sub 3}N{sub 4} and SiC fibers. Fracture mechanics work to correlate with NDE data focused on strength distribution of as-fabricated Nicalon fibers obtained from bundle tests. Strength distribution of fractured Nicalon fibers in composites was assessed from fracture mirror radii. SEM was used to determine distribution of fiber pullout length distribution for fibers in composites, for their strength distribution. From the strength distribution plots, scale parameters were determined to be 3.45 GPa for as-fabricated fibers and 1.31 GPa for fibers in processed composites. However, the Weibull moduli for the two distributions were similar. Reduction in strength of the fibers in processed composites is believed to be due to surface flaws and defects. Effects of fiber misorientation on mechanical properties of NDE-tested CVI continuous-fiber composites are currently being investigated. 8 figs, 11 refs.

  14. Fatal Flaw Analysis of Utility-Scale Wind Turbine Generators at the West Haymarket Joint Public Agency. A Study Prepared in Partnership with the Environmental Protection Agency for the RE-Powering America's Land Initiative: Siting Renewable Energy on Potentially Contaminated Land and Mine Sites

    SciTech Connect (OSTI)

    Roberts, J. O.; Mosey, G.

    2013-08-01T23:59:59.000Z

    Fatal flaw analysis of utility-scale wind turbines at the West Haymarket Joint Public Agency brownfields site in Lincoln, Nebraska, funded by EPA.

  15. Summary of meeting on disposal of LET&D HEPA filters

    SciTech Connect (OSTI)

    Not Available

    1991-11-21T23:59:59.000Z

    This report is a compilation of correspondence between Westinghouse Idaho Nuclear Company and the US EPA over a period of time from 1988 to 1992 (most from 1991-92) regarding waste management compliance with EPA regulations. Typical subjects include: compliance with satellite accumulation requirements; usage of ``Sure Shot`` containers in place of aerosol cans; notice of upcoming recyclable battery shipments; disposition of batteries; HEPA filter leach sampling and permit impacts; functional and operation requirements for the spent filter handling system; summary of meeting on disposal of LET and D HEPA filters; solvent substitution database report; and mercury vapor light analytical testing.

  16. Let's Keep Talking: Women in STEM Tweet Up | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 |KSRS25RV*)Boyd About Us Lauren BoydTheLessonsLet's Keep

  17. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsersExecuteGainLet

  18. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  19. 978-1-4799-1270-4/13/$31.00 c 2013 IEEE Let's ChronoSync: Decentralized Dataset State

    E-Print Network [OSTI]

    California at Los Angeles, University of

    978-1-4799-1270-4/13/$31.00 c 2013 IEEE Let's ChronoSync: Decentralized Dataset State of knowledge about the dataset such as text messages, changes to the shared folder, or document edits. We to efficiently synchronize the state of a dataset among a distributed group of users. Using appropriate naming

  20. Resume of definitions of "tangent vector" Let M be a manifold, m M, and X = (X1

    E-Print Network [OSTI]

    Feldman, Joel

    Resum´e of definitions of "tangent vector" Let M be a manifold, m M, and X = (X1 , · · ·Xd ) : U Joel Feldman. 2008. All rights reserved. September 30, 2008 Resum´e of definitions of "tangent vector rights reserved. September 30, 2008 Resum´e of definitions of "tangent vector" 2 #12;

  1. Partial Solutions for Assignment 1 (1) In a certain random experiment, let A and B be two events such that P(A) = 0.7,

    E-Print Network [OSTI]

    Chen, Chaur-Chin

    of the slots in which the ball falls. (a) The sample space S = {1, 2, , 35, 36, 0, 00}. (b) Let B = {0, 00) A box contains four marbles numbered 1 through 4. The marbles are selected one at a time without replacement. A match occurs if marble numbered k is the kth marble selected. Let the event Ai, denote a match

  2. Math 603 Problem Set #5 Due Mon., Feb. 28, 2005 1. a) Let V be an affine variety, with ring of functions R. Let W be a Zariski closed

    E-Print Network [OSTI]

    Harbater, David

    ]. Justify your assertions. 4. Given a commutative ring R, define the maximal spectrum of R (denoted Max R) to be the set of maximal ideals of R. For each subset E R, let V (E) denote the set {m Max R | E m} Max R. a) Show that Max R has a topology in which the closed sets are precisely the sets V (E). b) Show that V (E

  3. Lack of Bystander Effects From High LET Radiation For Early Cytogenetic Endpoints.

    SciTech Connect (OSTI)

    Groesser, Torsten; Cooper, Brian; Rydberg, Bjorn

    2008-05-07T23:59:59.000Z

    The aim of this work was to study radiation-induced bystander effects for early cytogenetic end points in various cell lines using the medium transfer technique after exposure to high- and low-LET radiation. Cells were exposed to 20 MeV/ nucleon nitrogen ions, 968 MeV/nucleon iron ions, or 575 MeV/nucleon iron ions followed by transfer of the conditioned medium from the irradiated cells to unirradiated test cells. The effects studied included DNA double-strand break induction, {gamma}-H2AX focus formation, induction of chromatid breaks in prematurely condensed chromosomes, and micronucleus formation using DNA repair-proficient and -deficient hamster and human cell lines (xrs6, V79, SW48, MO59K and MO59J). Cell survival was also measured in SW48 bystander cells using X rays. Although it was occasionally possible to detect an increase in chromatid break levels using nitrogen ions and to see a higher number of {gamma}-H2AX foci using nitrogen and iron ions in xrs6 bystander cells in single experiments, the results were not reproducible. After we pooled all the data, we could not verify a significant bystander effect for any of these end points. Also, we did not detect a significant bystander effect for DSB induction or micronucleus formation in these cell lines or for clonogenic survival in SW48 cells. The data suggest that DNA damage and cytogenetic changes are not induced in bystander cells. In contrast, data in the literature show pronounced bystander effects in a variety of cell lines, including clonogenic survival in SW48 cells and induction of chromatid breaks and micronuclei in hamster cells. To reconcile these conflicting data, it is possible that the epigenetic status of the specific cell line or the precise culture conditions and medium supplements, such as serum, may be critical for inducing bystander effects.

  4. 11406. Proposed by A. A. Dzhumadil'daeva, Almaty, Republics Physics and Mathematics School, Almaty, Kazakhstan. Let n!! denote the product of all positive integers not greter than n and congruent to n mod 2,

    E-Print Network [OSTI]

    Heckman, Christopher Carl

    , Kazakhstan. Let n!! denote the product of all positive integers not greter than n and congruent to n mod 2

  5. Depth absorbed dose and LET distributions of therapeutic {sup 1}H, {sup 4}He, {sup 7}Li, and {sup 12}C beams

    SciTech Connect (OSTI)

    Kempe, Johanna; Gudowska, Irena; Brahme, Anders [Division of Medical Radiation Physics, Department of Oncology-Pathology, Karolinska Institutet and Stockholm University, Box 260, SE-171 76 Stockholm (Sweden)

    2007-01-15T23:59:59.000Z

    The depth absorbed dose and LET (linear energy transfer) distribution of different ions of clinical interest such as {sup 1}H, {sup 4}He, {sup 7}Li, and {sup 12}C ions have been investigated using the Monte Carlo code SHIELD-HIT. The energies of the projectiles correspond to ranges in water and soft tissue of approximately 260 mm. The depth dose distributions of the primary particles and their secondaries have been calculated and separated with regard to their low and high LET components. A LET value below 10 eV/nm can generally be regarded as low LET and sparsely ionizing like electrons and photons. The high LET region may be assumed to start at 20 eV/nm where on average two double-strand breaks can be formed when crossing the periphery of a nucleosome, even though strictly speaking the LET limits are not sharp and ought to vary with the charge and mass of the ion. At the Bragg peak of a monoenergetic high energy proton beam, less than 3% of the total absorbed dose is comprised of high LET components above 20 eV/nm. The high LET contribution to the total absorbed dose in the Bragg peak is significantly larger with increasing ion charge as a natural result of higher stopping power and lower range straggling. The fact that the range straggling and multiple scattering are reduced by half from hydrogen to helium increases the possibility to accurately deposit only the high LET component in the tumor with negligible dose to organs at risk. Therefore, the lateral penumbra is significantly improved and the higher dose gradients of {sup 7}Li and {sup 12}C ions both longitudinally and laterally will be of major advantage in biological optimized radiation therapy. With increasing charge of the ion, the high LET absorbed dose in the beam entrance and the plateau regions where healthy normal tissues are generally located is also increased. The dose distribution of the high LET components in the {sup 7}Li beam is only located around the Bragg peak, characterized by a Gaussian-type distribution. Furthermore, the secondary particles produced by high energy {sup 7}Li ions in tissuelike media have mainly low LET character both in front of and beyond the Bragg peak.

  6. MOLECULAR MECHANISM OF SUPPRESSION OF NEOPLASTIC TRANSFORMATION BY LOW DOSES OF LOW LET RADIATION

    SciTech Connect (OSTI)

    J.LESIE REDPATH, PH.D.

    2011-03-29T23:59:59.000Z

    We are currently funded (9/01-8/04) by the DOE Low Dose Radiation Research Program to examine mechanisms underlying the suppression of neoplastic transformation in vitro by low doses of low LET radiation. For the new studies proposed under Notice 04-21, we intend to follow up on our observation that upregulation of DNA repair may be an important factor and that its importance is dose-dependent. The experimental system will be the human hybrid cell neoplastic transformation assay that we are currently using. We propose to test the following hypothesis: Down-regulation of DNA dsb repair will abrogate the low dose suppression of neoplastic transformation. Using the technique of RNA silencing, it is proposed to test the effect of down-regulation of the two major DNA dsb repair pathways, homologous recombination (HR) and non-homologous end-joining (NHEJ), on the dose response relationship for neoplastic transformation. Based on prior studies, we predict that this will result in abrogation of the suppressive effect at doses in the range 1 to 10 cGy, but not at lower doses. The proposed experiments will also help address the question as to which of the two DNA repair pathways may be the most important in causing suppression of transformation. HR is a pathway that is predominant in S and G2 phase cells and is known to be less error-prone than the NHEJ pathway that is predominant in G1 phase. We hypothesize that down-regulation of HR will result in the most effective abrogation of suppression. An important component of this study will be the determination of the how abrogation of DNA dsb repair impacts the spontaneous transformation frequency, presumably a consequence of endogeneous DNA damage. Experiments will be carried out using partially synchronized populations of cells enriched for G1 and S/G2 respectively. In addition to the endpoint of neoplastic transformation the impact of down-regulation of HR and NHEJ on the formation and disappearance of the DNA dsb marker, gamma-H2AX, will be studied.

  7. WBS-FOR CREATING AN ER-MODEL Let A(Ei) = the set of attributes of entity-set an Ei.

    E-Print Network [OSTI]

    Kundu, Sukhamay

    WBS-FOR CREATING AN ER-MODEL Let A(Ei) = the set of attributes of entity-set an Ei. Let A from each Ei partici- pating in Rj, can interact multiple times, then we need a pri- mary key among FOR CREATING ER-MODELS Identify name and A(Ei) for each Ei Identify a primary key for each Ei Identify name

  8. In-service Inspection Ultrasonic Testing of Reactor Pressure Vessel Welds for Assessing Flaw Density and Size Distribution per 10 CFR 50.61a, Alternate Fracture Toughness Requirements

    SciTech Connect (OSTI)

    Sullivan, Edmund J.; Anderson, Michael T.; Norris, Wallace

    2012-09-17T23:59:59.000Z

    Pressurized thermal shock (PTS) events are system transients in a pressurized water reactor (PWR) in which there is a rapid operating temperature cool-down that results in cold vessel temperatures with or without repressurization of the vessel. The rapid cooling of the inside surface of the reactor pressure vessel (RPV) causes thermal stresses that can combine with stresses caused by high pressure. The aggregate effect of these stresses is an increase in the potential for fracture if a pre-existing flaw is present in a material susceptible to brittle failure. The ferritic, low alloy steel of the reactor vessel beltline adjacent to the core, where neutron radiation gradually embrittles the material over the lifetime of the plant, can be susceptible to brittle fracture. The PTS rule, described in the Code of Federal Regulations, Title 10, Section 50.61 (50.61), Fracture Toughness Requirements for Protection against Pressurized Thermal Shock Events, adopted on July 23, 1985, establishes screening criteria to ensure that the potential for a reactor vessel to fail due to a PTS event is deemed to be acceptably low. The U.S. Nuclear Regulatory Commission (NRC) completed a research program that concluded that the risk of through-wall cracking due to a PTS event is much lower than previously estimated. The NRC subsequently developed a rule, 50.61a, published on January 4, 2010, entitled Alternate Fracture Toughness Requirements for Protection Against Pressurized Thermal Shock Events (75 FR 13). Use of the new rule by licensees is optional. The 50.61a rule differs from 50.61 in that it requires licensees who choose to follow this alternate method to analyze the results from periodic volumetric examinations required by the ASME Code, Section XI, Rules for Inservice Inspection (ISI) of Nuclear Power Plants. These analyses are intended to determine if the actual flaw density and size distribution in the licensees reactor vessel beltline welds are bounded by the flaw density and size distribution values used in the PTS technical basis. Under a contract with the NRC, Pacific Northwest National Laboratory (PNNL) has been working on a program to assess the ability of current inservice inspection (ISI)-ultrasonic testing (UT) techniques, as qualified through ASME Code, Appendix VIII, Supplements 4 and 6, to detect small fabrication or inservice-induced flaws located in RPV welds and adjacent base materials. As part of this effort, the investigators have pursued an evaluation, based on the available information, of the capability of UT to provide flaw density/distribution inputs for making RPV weld assessments in accordance with 50.61a. This paper presents the results of an evaluation of data from the 1993 Browns Ferry Nuclear Plant, Unit 3, Spirit of Appendix VIII reactor vessel examination, a comparison of the flaw density/distribution from this data with the distribution in 50.61a, possible reasons for differences, and plans and recommendations for further work in this area.

  9. Theorem: L : Z List. ( p :{Z Z | let m, i = p in max_seg_sum(m; L) max_initseg_sum(i; L)}) L:Z List. (p:{Z Z| let m,i = p in max_seg_sum(m;L) max_initseg_sum(i;L)})

    E-Print Network [OSTI]

    (u;u + p2) initseg_sum(r;[u; u1 / v]) )) 2 #12;Theorem: L : Z List. ( p :{Z ? Z | let m, i = p in maxTheorem: L : Z List. ( p :{Z ? Z | let m, i = p in max_seg_sum(m; L) max_initseg_sum(i; L)}) L:Z List. (p:{Z ? Z| let m,i = p in max_seg_sum(m;L) max_initseg_sum(i;L)}) | BY (D 0 THENA Auto) | 1. L

  10. Definition 0.1. Let D be any set and f W D ! R a function. An element 2 D is a (global or absolute) maximum for f on D if for all x 2 D, f ./ f .x/. The

    E-Print Network [OSTI]

    Goodman, Fred

    Definition 0.1. Let D be any set and f W D ! R a function. An element 2 D is a (global or absolute the maximum value. Minimum is defined similarly. Definition 0.2. Let f W D ! R as above. The function f. The function f is said to be bounded if it is bounded both above and below. Now let D be a subset of R (the

  11. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsers

  12. U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)ArbitraryprintersDepartment

  13. U-188: MySQL User Login Security Bypass and Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    An error when verifying authentication attempts can be exploited to bypass the authentication mechanism.

  14. `Green Christmas' Advice There are lots of ways to stay 'green' over the festive period so let's not make our buildings work hard

    E-Print Network [OSTI]

    Wirosoetisno, Djoko

    `Green Christmas' Advice There are lots of ways to stay 'green' over the festive period so let's not make our buildings work hard when we're off on holiday! Read these simple tips to find out how. Make that are needed are turned on, and that these are turned off again as you leave the building. Don't leave any non

  15. `Green Christmas' Advice There are lots of ways to stay 'green' over the festive period so let's not make our buildings work hard

    E-Print Network [OSTI]

    Wirosoetisno, Djoko

    `Green Christmas' Advice There are lots of ways to stay 'green' over the festive period so let's not make our buildings work hard when we're off on holiday! Read these simple tips to find out how. Make leave the building. Don't leave any non-essential items on standby - appliances such as televisions left

  16. 2.5 CONTINUUM MECHANICS (FLUIDS) Let us consider a fluid medium and use Cartesian tensors to derive the mathematical equations that

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    282 §2.5 CONTINUUM MECHANICS (FLUIDS) Let us consider a fluid medium and use Cartesian tensors to derive the mathematical equations that describe how a fluid behaves. A fluid continuum, like a solid, is the density of the fluid, ij is the stress tensor and bj is an external force per unit mass. In the cgs system

  17. 2.5 CONTINUUM MECHANICS (FLUIDS) Let us consider a fluid medium and use Cartesian tensors to derive the mathematical equations that

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    282 §2.5 CONTINUUM MECHANICS (FLUIDS) Let us consider a fluid medium and use Cartesian tensors to derive the mathematical equations that describe how a fluid behaves. A fluid continuum, like a solid , i = 1, 2, 3 is a velocity field, # is the density of the fluid, # ij is the stress tensor and b j

  18. Offcampus Employee Contributions Can Help CEMML Accomplish Strategic Goals (Don't let these suggestions constrain you. If you feel you can help CEMML accomplish its stated

    E-Print Network [OSTI]

    Offcampus Employee Contributions Can Help CEMML Accomplish Strategic Goals (Don't let these suggestions constrain you. If you feel you can help CEMML accomplish its stated Strategic Goals in a way your thoughts about how CEMML expand the services we provide to other agencies. This will help us

  19. Let's Talk Turkey -Facts for Food Safety It is important to be careful when you handle, store, cook, and serve turkey.

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Let's Talk Turkey - Facts for Food Safety It is important to be careful when you handle, store, cook, and serve turkey. Follow the rules and the guidelines in this fact sheet to keep your turkey safe and delicious. What to do when you get the turkey Take the turkey home right after you get it. Put

  20. Microbial Fuel Cells: Now Let us Talk about Energy Department of Civil Engineering and Mechanics, University of Wisconsin-Milwaukee, Milwaukee, Wisconsin 53211, United States

    E-Print Network [OSTI]

    Microbial Fuel Cells: Now Let us Talk about Energy Zhen He* Department of Civil Engineering for wastewater treatment and bioenergy production from wastes. Direct electricity generation in MFCs wastewater starts its introduction with the energy benefits of MFCs. However, are we really showing any

  1. Water Conservation Tips When washing dishes by hand, don't let the water run while rinsing. Fill one sink with wash water and the

    E-Print Network [OSTI]

    Water Conservation Tips When washing dishes by hand, don't let the water run while rinsing. Fill one sink with wash water and the other with rinse water. Run your washing machine and dishwasher only instead and save gallons every time. For cold drinks keep a pitcher of water in the refrigerator instead

  2. Is going legal the only way? Let me ease my way into the more serious stuff with a multilingual joke in questionable taste

    E-Print Network [OSTI]

    Sunder, V S

    returned to India after more than a decade of living in the US and been working in Kozhikode for more than with disabilities in India. He was quite supportive, but did underline the opinion that probably the only way, he was saying sue-sue is the only winning policy! Let us consider the alternatives and examine

  3. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

    Broader source: Energy.gov (indexed) [DOE]

    8: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

  4. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    target user's system. October 27, 2011 U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files A vulnerability was reported in Cisco...

  5. U-006:Cisco Network Admission Control Manager Directory Traversal...

    Broader source: Energy.gov (indexed) [DOE]

    6:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information U-006:Cisco Network Admission Control Manager...

  6. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    7, 2011 U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information An unauthenticated attacker could exploit...

  7. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    7, 2011 U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information An unauthenticated attacker could exploit...

  8. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    keeps track of UDP packets within memory. November 9, 2011 U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication A remote user can bypass...

  9. T-709:Mac OS X Keychain Certificate Settings Can Be Bypassed...

    Broader source: Energy.gov (indexed) [DOE]

    available at the time of this entry. Addthis Related Articles U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-130: JBoss Operations...

  10. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    target user's system. October 27, 2011 U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files A vulnerability was reported in Cisco...

  11. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    keeps track of UDP packets within memory. November 9, 2011 U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication A remote user can bypass...

  12. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. November 9, 2012 V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple...

  13. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. November 9, 2012 V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple...

  14. T-625: Opera Frameset Handling Memory Corruption Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    security and stability enhancements. Opera Download Addthis Related Articles V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-105: Google Chrome...

  15. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    vulnerabilities were reported in Symantec Messaging Gateway. August 29, 2012 U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain...

  16. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Broader source: Energy.gov (indexed) [DOE]

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  17. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    vulnerabilities were reported in Symantec Messaging Gateway. August 29, 2012 U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain...

  18. V-232: Cisco ASA Software TFTP Protocol Inspection Denial of...

    Broader source: Energy.gov (indexed) [DOE]

    T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

  19. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...

    Broader source: Energy.gov (indexed) [DOE]

    Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-126: Cisco Adaptive...

  20. U-236: Microsoft JScript and VBScript Engine Integer Overflow...

    Broader source: Energy.gov (indexed) [DOE]

    Code U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code...

  1. Accommodation Letting agencies

    E-Print Network [OSTI]

    Bristol, University of

    's responsibility to understand each accommodation agency's terms and conditions of business. Some agencies throughout the term of the tenancy. Agencies may only charge you when they find you a suitable property you 35% of the first month's rent. Please ensure that you check on any charges before entering

  2. Let the show begin

    SciTech Connect (OSTI)

    Alperowicz, N.

    1993-01-27T23:59:59.000Z

    Major changes should occur in the European polyolefins industry this year. BASF's (Ludwigshafen) polypropylene (PP) deal with ICI is expected to be followed by that of Hoechst (Frankfurt) and Petrofina (Brussels). The two are engaged in feasibility studies for a possible joint venture in PP and are expected to make a decision in the second quarter of this year. Shell and Himont are on track to complete their feasibility study in the first quarter for a polyolefins joint venture. And Huels and PCD are still in talks. But two new possible deals, a polyolefins merger between Nests (Helsinki) and Statoil (Stavanger) and an alliance in PP involving Appryl, the Elf Atochem (51%)/BP Chemicals (49%) joint venture, and Solvay have been denied. The Hoechst/Fina venture would initially encompass only the two companies European plants - Hoechst's 550,000-m.t./year and Fina's 180,000 m.t./year. In addition, Fina would either build or acquire another PP plant. In the second stage, the partners could bring in their overseas plants. Fina has plants in the US, and Hoechst has a combined 100,000 m.t./year in south Africa and Australia. Neste's board member Jukka Viinanen says the only talks between Nests and Statoil center on renegotiations of ethylene supply contract at Stenungsund, Sweden. Nests wants a more flexible deal on quantity and price. It needs 400,000 m.t./year of ethylene for its downstream plants. Viinanen adds that he is worried about the European petrochemical industry and producers need to do everything to improve margins through pricing policies and obtaining a balance between supply and demand. On the possibility of a future link with Statoil he comments, One can never say never. It would take time. We don't feel in a very vulnerable position right now.

  3. Never Let Me Down

    E-Print Network [OSTI]

    Shoshanna

    1992-01-01T23:59:59.000Z

    little. "Would you believe it? Shot the RT out of my hand. One in a million." And he flexed his fingers, wincing. Two knuckles were red and swollen, where they had been twisted by the impact "Need a doctor?" "Nah. Ice'll do it" Jax and Murphy were...

  4. Let's Go Veggie!

    E-Print Network [OSTI]

    2014-08-30T23:59:59.000Z

    Food Inspection Agency, six out of ten chickens are infected with salmonella. It's like playing Russian roulette with your health. So why aren't governments doing...

  5. Evaluation on the Feasibility of Using Ultrasonic Testing of Reactor Pressure Vessel Welds for Assessing Flaw Density/Distribution per 10 CFR 50.61a, Alternate Fracture Toughness Requirements for Protection Against Pressurized Thermal Shock

    SciTech Connect (OSTI)

    Sullivan, Edmund J.; Anderson, Michael T.

    2014-06-10T23:59:59.000Z

    This technical letter report provides the status of an assessment undertaken by PNNL at the request of the NRC to verify the capability of periodic ASME-required volumetric examinations of reactor vessels to characterize the density and distribution of flaws of interest for applying 50.61a on a plant-by-plant basis. The PTS rule, described in the Code of Federal Regulations, Title 10, Section 50.61 (50.61), "Fracture Toughness Requirements for Protection against Pressurized Thermal Shock Events," establishes screening criteria to ensure that the potential for a reactor vessel to fail due to a PTS event is deemed to be acceptably low. Recently, the NRC completed a research program that concluded that the risk of through-wall cracking due to a PTS event is much lower than previously estimated. The NRC subsequently developed and promulgated an alternate PTS rule, 50.61a, that can be implemented by PWR licensees. The 50.61a rule differs from 50.61 in that it requires licensees who choose to follow this alternate method to analyze the results from periodic volumetric examinations required by the ASME Code, Section XI, Rules for Inservice Inspection (ISI) of Nuclear Power Plants.

  6. 11196. Proposed by Mohammad Hossein Mehrabi, Iran University of Science and Technology, Tehran, Iran. Let A and B be real n n matrices. Show that if AB -BA is invertible and A2

    E-Print Network [OSTI]

    Heckman, Christopher Carl

    11196. Proposed by Mohammad Hossein Mehrabi, Iran University of Science and Technology, Tehran, Iran. Let A and B be real n ? n matrices. Show that if AB - BA is invertible and A2 + B2 = 3(AB - BA

  7. The flaw in the firewall argument

    E-Print Network [OSTI]

    Samir D. Mathur; David Turton

    2014-05-28T23:59:59.000Z

    A lot of confusion surrounds the issue of black hole complementarity, because the question has been considered without discussing the mechanism which guarantees unitarity. Considering such a mechanism leads to the following: (1) The Hawking quanta with energy E of order the black hole temperature T carry information, and so only appropriate processes involving E>>T quanta can have any possible complementary description with an information-free horizon; (2) The stretched horizon describes all possible black hole states with a given mass M, and it must expand out to a distance s_{bubble} before it can accept additional infalling bits; (3) The Hawking radiation has a specific low temperature T, and infalling quanta interact significantly with it only within a distance s_{alpha} of the horizon. One finds s_{alpha} >T, and this removes the argument against complementarity recently made by Almheiri et al. In particular, the condition E>>T leads to the notion of 'fuzzball complementarity', where the modes around the horizon are indeed correctly entangled in the complementary picture to give the vacuum.

  8. Error of law and flawed administrative acts

    E-Print Network [OSTI]

    Feldman, David

    2014-07-17T23:59:59.000Z

    , if so, what form that intervention should take.49 This applies to claimants seeking a declaration of incompatibility under section 4 of the Human Rights Act 1998 as it does to those seeking other remedies.50 It relates back to our first principle... ), [2008] 2 C.M.L.R. 57, Admin. Ct., and [2008] EWHC 1409 (Admin), [2008] A.C.D. 70, DC. 48 R. v Inland Revenue Commissioners, ex parte National Federation of Self-Employed and Small Businesses Ltd [1982] A.C. 617, HL. 49 R. v Panel on Take...

  9. Real-time Molecular Study of Bystander Effects of Low dose Low LET radiation Using Living Cell Imaging and Nanoparticale Optics

    SciTech Connect (OSTI)

    Natarajan, Mohan [UT Health Science Center at San Antonio; Xu, Nancy R [Old Dominion University; Mohan, Sumathy [UT Health Science Center at San Antonio

    2013-06-03T23:59:59.000Z

    In this study two novel approaches are proposed to investigate precisely the low dose low LET radiation damage and its effect on bystander cells in real time. First, a flow shear model system, which would provide us a near in vivo situation where endothelial cells in the presence of extra cellular matrix experiencing continuous flow shear stress, will be used. Endothelial cells on matri-gel (simulated extra cellular matrix) will be subjected to physiological flow shear (that occurs in normal blood vessels). Second, a unique tool (Single nano particle/single live cell/single molecule microscopy and spectroscopy; Figure A) will be used to track the molecular trafficking by single live cell imaging. Single molecule chemical microscopy allows one to single out and study rare events that otherwise might be lost in assembled average measurement, and monitor many target single molecules simultaneously in real-time. Multi color single novel metal nanoparticle probes allow one to prepare multicolor probes (Figure B) to monitor many single components (events) simultaneously and perform multi-complex analysis in real-time. These nano-particles resist to photo bleaching and hence serve as probes for unlimited timeframe of analysis. Single live cell microscopy allows one to image many single cells simultaneously in real-time. With the combination of these unique tools, we will be able to study under near-physiological conditions the cellular and sub-cellular responses (even subtle changes at one molecule level) to low and very low doses of low LET radiation in real time (milli-second or nano-second) at sub-10 nanometer spatial resolution. This would allow us to precisely identify, at least in part, the molecular mediators that are responsible of radiation damage in the irradiated cells and the mediators that are responsible for initiating the signaling in the neighboring cells. Endothelial cells subjected to flow shear (2 dynes/cm2 or 16 dynes/cm2) and exposed to 0.1, 1 and 10 cGy on coverslips will be examined for (a) low LET radiation-induced alterations of cellular function and its physiological relevance in real time; and (b) radiation damage triggered bystander effect on the neighboring unirradiated cells. First, to determine the low LET radiation induced alteration of cellular function we will examine: (i) the real time transformation of single membrane transporters in single living cells; (ii) the pump efficiency of membrane efflux pump of live cells in real time at the molecular level; (iii) the kinetics of single-ligand receptor interaction on single live cell surface (Figure C); and (iv) alteration in chromosome replication in living cell. Second, to study the radiation triggered bystander responses, we will examine one of the key signaling pathway i.e. TNF- alpha/NF-kappa B mediated signaling. TNF-alpha specific nano particle sensors (green) will be developed to detect the releasing dynamics, transport mechanisms and ligand-receptor binding on live cell surface in real time. A second sensor (blue) will be developed to simultaneously monitor the track of NF-kB inside the cell. The proposed nano-particle optics approach would complement our DOE funded study on biochemical mechanisms of TNF-alpha- NF-kappa B-mediated bystander effect.

  10. PNSQC 2013 Call for Abstracts is now open let us know how you see quality today! Put your face on quality and be part of the speaker program by submitting an abstract for a

    E-Print Network [OSTI]

    Chapman, Michael S.

    platforms, Quality across the team, Quality across roles as tester, developer, project manager such as legal, medical, banking, Quality in management, processes, team interactions, Quality in estimatingPNSQC 2013 Call for Abstracts is now open ­ let us know how you see quality today! Put your face

  11. Every year, the Career Center surveys new UW alumni. Below are some quotes from 2011-2012 undergraduate & graduate level alumni regarding how they found their jobs. If you need help finding a job, let us know!

    E-Print Network [OSTI]

    Kaminsky, Werner

    -2012 undergraduate & graduate level alumni regarding how they found their jobs. If you need help finding a job, let helped me get this job." "I obtained this job by way of alumni networking connections." "My department's mentor program was very, very helpful to my career search and networking." "Working on a real project

  12. Lets Get Serious: Communicating Commitment in Romantic Relationships

    E-Print Network [OSTI]

    Ackerman, Joshua

    Are men or women more likely to confess love first in romantic relationships? And how do men and women feel when their partners say I love you? An evolutionaryeconomics perspective contends that women and men incur ...

  13. Let's Work On Your IDP

    Broader source: Energy.gov [DOE]

    Registration link: Register through Employee Self Service (ESS) CHRIS System.For organizations not currently using the CHRIS workflow process, please follow your existing interoffice training...

  14. Let's Work On Your IDP

    Broader source: Energy.gov [DOE]

    Registration link:Register through Employee Self Service (ESS) CHRIS SystemFor organizations not currently using the CHRIS workflow process, please follow your existing interoffice training...

  15. Math 603 Problem Set #7 Due Friday, March 15, 2013 1. a) Let R be a Noetherian ring, I the set of proper ideals of R, and I0 a subset of I.

    E-Print Network [OSTI]

    Harbater, David

    a commutative ring R, define the maximal spectrum of R (denoted Max R) to be the set of maximal ideals of R. For each subset E R, let V (E) denote the set {m Max R | E m} Max R. a) Show that Max R has a topology[x], and in the case R = Z. g) If R = C[x, y]/(f), is there a continuous bijective map between Max R and the locus

  16. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    system. A remote user can cause denial of service conditions. January 23, 2013 V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary...

  17. Determination of absorbed dose to water around a clinical HDR {sup 192}Ir source using LiF:Mg,Ti TLDs demonstrates an LET dependence of detector response

    SciTech Connect (OSTI)

    Carlsson Tedgren, Aasa; Elia, Rouba; Hedtjaern, Haakan; Olsson, Sara; Alm Carlsson, Gudrun [Radiation Physics, Department of Medical and Health Sciences (IMH), Faculty of Health Sciences, Linkoeping University, SE 581 85 Linkoeping (Sweden) and Swedish Radiation Safety Authority, SE 171 16 Stockholm (Sweden); Radiation Physics, Department of Medical and Health Sciences (IMH), Faculty of Health Sciences, Linkoeping University, SE 581 85 Linkoeping (Sweden); Radiation Physics, Department of Medical and Health Sciences (IMH), Faculty of Health Sciences, Linkoeping University, SE 581 85 Linkoeping (Sweden) and Department of Radiation Physics UHL, County Council of Oestergoetland, SE 581 85 Linkoeping (Sweden); Radiation Physics, Department of Medical and Health Sciences (IMH), Faculty of Health Sciences, Linkoeping University, SE 581 85 Linkoeping (Sweden)

    2012-02-15T23:59:59.000Z

    Purpose: Experimental radiation dosimetry with thermoluminescent dosimeters (TLDs), calibrated in a {sup 60}Co or megavoltage (MV) photon beam, is recommended by AAPM TG-43U1for verification of Monte Carlo calculated absorbed doses around brachytherapy sources. However, it has been shown by Carlsson Tedgren et al.[Med. Phys. 38, 5539-5550 (2011)] that for TLDs of LiF:Mg,Ti, detector response was 4% higher in a {sup 137}Cs beam than in a {sup 60}Co one. The aim of this work was to investigate if similar over-response exists when measuring absorbed dose to water around {sup 192}Ir sources, using LiF:Mg,Ti dosimeters calibrated in a 6 MV photon beam. Methods: LiF dosimeters were calibrated to measure absorbed dose to water in a 6 MV photon beam and used to measure absorbed dose to water at distances of 3, 5, and 7 cm from a clinical high dose rate (HDR) {sup 192}Ir source in a polymethylmethacrylate (PMMA) phantom. Measured values were compared to values of absorbed dose to water calculated using a treatment planning system (TPS) including corrections for the difference in energy absorption properties between calibration quality and the quality in the users'{sup 192}Ir beam and for the use of a PMMA phantom instead of the water phantom underlying dose calculations in the TPS. Results: Measured absorbed doses to water around the {sup 192}Ir source were overestimated by 5% compared to those calculated by the TPS. Corresponding absorbed doses to water measured in a previous work with lithium formate electron paramagnetic resonance (EPR) dosimeters by Antonovic et al. [Med. Phys. 36, 2236-2247 (2009)], using the same irradiation setup and calibration procedure as in this work, were 2% lower than those calculated by the TPS. The results obtained in the measurements in this work and those obtained using the EPR lithium formate dosimeters were, within the expanded (k = 2) uncertainty, in agreement with the values derived by the TPS. The discrepancy between the results using LiF:Mg,Ti TLDs and the EPR lithium formate dosimeters was, however, statistically significant and in agreement with the difference in relative detector responses found for the two detector systems by Carlsson Tedgren et al. [Med. Phys. 38, 5539-5550 (2011)] and by Adolfsson et al.[Med. Phys. 37, 4946-4959 (2010)]. Conclusions: When calibrated in {sup 60}Co or MV photon beams, correction for the linear energy transfer (LET) dependence of LiF:Mg,Ti detector response will be needed as to measure absorbed doses to water in a {sup 192}Ir beam with highest accuracy. Such corrections will depend on the manufacturing process (MTS-N Poland or Harshaw TLD-100) and details of the annealing and read-out schemes used.

  18. Flaw-limited transport in germanium-on-silicon photodiodes

    E-Print Network [OSTI]

    Orcutt, Jason S. (Jason Scott)

    2008-01-01T23:59:59.000Z

    Epitaxial germanium growth on silicon substrates has enabled a new class of photodiodes that can be integrated with traditional silicon electronics. Previous workers using lowthroughput growth techniques have demonstrated ...

  19. Professor Clive Brasier, Forest Research UK Scientific and operational flaws

    E-Print Network [OSTI]

    circinatum, recently reported from Spain, Italy; now spread to Portugal? .. Photos: Joan Webber Forest and mortality of cork oaks and holm oaks in Spain and Portugal. Origin: Pacific-Celebes area. Phytophthora cinnamomi root disease of Q. ilex, Spain Photo Forest Research UK #12;Phytophthora alni sp. nov. on alder

  20. T-670: Skype Input Validation Flaw in 'mobile phone' Profile...

    Broader source: Energy.gov (indexed) [DOE]

    The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input. reference LINKS: SecurityTracker...

  1. U-147:Red Hat Enterprise MRG Grid Input Validation Flaw

    Broader source: Energy.gov [DOE]

    The MRG Management Console (Cumin) does not properly filter HTML code from user-supplied input before displaying the input.

  2. U-144:Juniper Secure Access Input Validation Flaw Permits Cross...

    Broader source: Energy.gov (indexed) [DOE]

    The vendor has issued a fix (7.0R9, 7.1R). Addthis Related Articles V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks T-701: Citrix Access...

  3. Impedance sensing of flaws in non-homogeneous materials

    DOE Patents [OSTI]

    Novak, J.L.

    1997-02-11T23:59:59.000Z

    An apparatus and method are disclosed for sensing impedances of materials placed in contact therewith. The invention comprises a plurality of drive electrodes and one or more sense electrodes. Both rotating electric fields and differently shaped electric fields are provided for, as are analysis of structure and composition at different orientations and depths. 10 figs.

  4. Flaw-detection characteristics of the compact MIB-4 betatron

    SciTech Connect (OSTI)

    Boiko, D.A.; Filimonov, A.A.; Chakhlov, V.L.

    1987-09-01T23:59:59.000Z

    The compact pulse betatron using electrons accelerated to an energy of up to 4 MeV (MIB-4) is designed for the radiographic inspection of reinforced-concrete structures and buildings, welded joints, various materials, and assemblies. Information which refines and complements the method of inspecting parts by means of the MIB-4 device is provided. The results obtained in testing this equipment abroad are given.

  5. U-139: IBM Tivoli Directory Server Input Validation Flaw | Department...

    Broader source: Energy.gov (indexed) [DOE]

    can conduct cross-site scripting attacks PLATFORM: Version(s): 6.2, 6.3 ABSTRACT: The Web Admin Tool does not properly filter HTML code from user-supplied input before...

  6. U-238: HP Service Manager Input Validation Flaw Permits Cross...

    Broader source: Energy.gov (indexed) [DOE]

    9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers...

  7. Flawed analysis of the possibility of air capture

    E-Print Network [OSTI]

    and energetic analysis of cap- turing CO2 from ambient air," House et al. (1) drew an analogy between air, New York, NY 10027; and c Global Thermostat, New York, NY 10025 1. House KZ, et al. (2011) Economic and energetic analysis of capturing CO2 from ambient air. Proc Natl Acad Sci USA 108:2042820433. 2. Lackner K

  8. Fractographic investigation of flaws in sintered SiC fiber

    SciTech Connect (OSTI)

    Srinivasan, G.V.; Venkateswaran, V. [Carborundum Company, Niagara Falls, NY (United States)

    1996-12-31T23:59:59.000Z

    The Carborundum Company has developed a continuous process to produce multifilament, polycrystalline SiC fiber tow. The process uses a melt spinning approach to make the green fibers wherein the submicron SiC powder is mixed with polymers and the resulting compound is melt spun and extruded through a spinnerette. After extraction, the green fibers are sintered in a continuous sintering line. The properties of this fiber are given. This paper will describe the use of fractography in directing the fiber developmental efforts, specifically on characterization of strength-limiting defects and their origination. Fractographic analysis is also extended to determining strength of fibers at any gauge length and in identifying artifacts associated with the tensile strength testing technique.

  9. V-192: Symantec Security Information Manager Input Validation Flaws Permit

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere isAttacksService

  10. U-175: Linux Kernel KVM Memory Slot Management Flaw

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system.

  11. SGA Biennial Meeting Let's Talk Ore Deposits

    E-Print Network [OSTI]

    Barton, Mark D.

    Institute for Mineral Resources, University of Arizona, Tucson, AZ 85721 U.S.A. * now at Bronco Creek Multiple igneous-related hydrothermal systems and related IOCG mineralization, near Copiapó, Chile Mark D about metal sources and traps, however similar patterns in many Cordilleran and global IOCG districts

  12. Let's Work on Your IDP Virtually

    Broader source: Energy.gov (indexed) [DOE]

    Even with Tight Budgets o Employee Development for Supervisors o How to Create IDPs in ESS In one to three months, you will receive an email to complete a Level 3 course...

  13. Letting the Brain Speak for itself

    E-Print Network [OSTI]

    Gerhard Werner

    2011-07-20T23:59:59.000Z

    Metaphors of Computation and Information tended to detract attention from the intrinsic modes of neural system functions, uncontaminated by the observer's role for collection and interpretation of experimental data. Recognizing the self-referential mode of function, and the propensity for self-organization to critical states requires a fundamental re-orientation with emphasis on the conceptual approaches of Complex System Dynamics. Accordingly, local cooperative processes, intrinsic to neural structures and of fractal nature, call for applying Fractional Calculus and models of Random Walks in Theoretical Neuroscience studies.

  14. Angling chromium to let oxygen through | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone by E-mail ShareRedAndreas E VasdekisAngela Norbeck

  15. TEORIJA IN PRAKSA let. 47, 5/2010 Pedro PERISTA*

    E-Print Network [OSTI]

    Birmingham, University of

    care. An example of this shift in philosophy is the implementation of a network of continuous health care service and social support, constituting an exception in a health system with no special units for the elderly nor specialised geriatric services. In the context of reforming the health system and the state

  16. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Energy Savers [EERE]

    address their concerns, collect input on program ideas, and obtain real-time feedback on what is and is not working in the field. This strategy allowed for program...

  17. Removing the Entropy Screen- To Let the Second Law Show

    E-Print Network [OSTI]

    Steinmeyer, D.

    the second 'law' in terms of work; rathel' than entropy, , REFERENCES 1. Steinmeyer, D., "Process Energy Conservation"" I in Kirk-Qtbmer: Encyclopedia of Chemical Technology; supplement volume, third edition, John Wiley, 1984 pp 669-697. 2. Kenney, W... for a given step. For example, the work used (including the lost work) by a distillation column is simply the difference in Wp of the heat supplied to the reboiler and taken out in the condenser: W =Q'To[l/T - 1/'1' ] (9) condenser reboiler where...

  18. Cards let a PDP-11 work like a VAX

    SciTech Connect (OSTI)

    Barney, C.

    1984-05-17T23:59:59.000Z

    The PDP-11 computer is still used widely, in part because of its many peripherals and software applications. For less than $7000, a new board-level product from American Information Systems Inc. promises to give the PDP-11 renewed life as a dual processor based on a UNIX-like operating system with more power than a VAX, its younger superminicomputer cousin. National Semiconductor Corp's 32032 is the foundation of the AIS/3210 system, which also includes a national 16082 memory-management chip and a 16081 floating-point-processor chip. One or more processor boards and memory boards from AIS plug directly into a 16-bit q bus.

  19. TQM, ISO 9000, and Commissioning (Let's Be Practical)

    E-Print Network [OSTI]

    Dunn, W.; Berner, W.

    2002-01-01T23:59:59.000Z

    consistent performance. International Standards Organization (ISO) applies discipline to that concept requiring a structured well-documented management environment capable of withstanding an audit. One could quickly build a library in the study of management...

  20. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  1. U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets...

    Broader source: Energy.gov (indexed) [DOE]

    Lifecycle Attachmate Downloads SecurityTracker Alert ID: 1026340 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Attachmate Reflection. A remote user...

  2. ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. 12: 162167 (2011)

    E-Print Network [OSTI]

    Robock, Alan

    in Wiley Online Library (wileyonlinelibrary.com) DOI: 10.1002/asl.316 The Geoengineering Model To evaluate the effects of stratospheric geoengineering with sulphate aerosols, we propose standard forcing and geoengineering, complicating the comparison of results. We recommend four experiments to explore the extent

  3. Embryonic stem cells: don't let litigation put

    E-Print Network [OSTI]

    Feng, Jian

    . A nation that aspires for equal protection under law and imposes no law regarding religion should not allow for intrusion into science in the name of law (Nature 467, 7 and 12; 2010). To make certain areas of research). An increase in demand by international markets for export commodities such as soya beans and beef will mean

  4. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    commands with the privileges of the target web service. This can be exploited to gain shell access on the target device. IMPACT: Execution of arbitrary code via network, User...

  5. V-098: Linux Kernel Extended Verification Module Bug Lets Local...

    Broader source: Energy.gov (indexed) [DOE]

    reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

  6. A theoretical analysis of proportional counter response versus LET

    E-Print Network [OSTI]

    Martin, George Gerald

    1970-01-01T23:59:59.000Z

    crimlurator settin A computer program rvas devcloned to couple t'ie energy disLribution and IDT equation;. of Lhe five b, rta emitter, : argon-41& krypton-85, iodine-333, xenon-133 and cesium-137, for clcLccror chamber sizes oF 50 cm. v 10 crn. x I c. m.... Fwergy spectrum of the 8 rays from A-gon-41. 18 F'IG. B. Fnezgy spectrum of the 8 rays from Krypton-85. . . FIG. 9. Energ~ spectrum of the 8 rays from Iodine-131. . . 20 FIG. 10. FIG. 11. Energy spectrum of the 8 rays from Xenon-133. . . Energy...

  7. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  8. 19JULY 2010 Let us bring technology news to you.

    E-Print Network [OSTI]

    Greenberg, Saul

    of the prototypes require batteries to operate, which wouldn't be practical for commercial uses, according to Juels. However, produc- tion versions wouldn't necessarily need batteries, Marquardt said, The experimental chip would contain general information and enable over- the-air access by a reader, while the other

  9. TEORIJA IN PRAKSA let. 47, 5/2010 Srna MANDIC*

    E-Print Network [OSTI]

    Birmingham, University of

    proportions of GDP in the EU-27. These developments, together with the weakly regulated real estate market AND THE ROLE OF HOUSING ASSETS IN SLOVENIA** Abstract. This paper is based on the DEMHOW project and aims of Slovenian households with regard to their security in old age and is based on the DEMHOW project whose

  10. ATMOSPHERIC SCIENCE LETTERS Atmos. Sci. Let. 14: 107111 (2013)

    E-Print Network [OSTI]

    Wang, Chunzai

    Asia-Pacific Climate Impact Centre, School of Energy and Environment, City University of Hong Kong on the equatorial westerly wind anomalies in the western Pacific for initiating an El Ni~no event: an Atmospheric for occurrence of the westerly wind bursts. The stronger northerlies over East Asia can also induce frequent cold

  11. V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    remote user can cause the Firefox installer to load a DLL from the default downloads directory and execute arbitrary code. Only Windows-based systems are affected. A remote user...

  12. T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny...

    Broader source: Energy.gov (indexed) [DOE]

    service conditions. PLATFORM: Prior to 1.6.1 - Apache Santuario XML Security for C++ library versions prior to V1.6.1 ABSTRACT: A buffer overflow exists when creating or...

  13. March 10, 2011 Let There Be More Efficient Light

    E-Print Network [OSTI]

    Colorado at Boulder, University of

    standards for light bulbs, which include a phasing out of incandescent bulbs in favor of more energy lyrically with two colleagues about "the incandescent bulb that has been turning back the night ever since

  14. Paralely mezi slovinskm a ?eskm dramatem 60. let

    E-Print Network [OSTI]

    Jensterle-Doleal, Alenka

    2009-02-01T23:59:59.000Z

    , s nm bude plodit d?t, pokra?ovn rodi- ny, a na h?bitov? stejn u nen dost msta. Ale rodina nechce dn zm?ny, trhliny se musej odstranit, ve h?e se mus pokra?ovat. Otec jen p?ipust, e se dcera m?e p?kn starat o hrob a nosit na hrob...

  15. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not...

  16. 1220 Comment sufficient to meet bacterial needs (let alone

    E-Print Network [OSTI]

    of the recycling of organic carbon by consumers may help to explain apparently excessive demands of consumers- has led to the assertion that bacterial sec- toplankton supply in the summer epilim- ondary production

  17. Going completely renewable: is it possible (let alone desirable)?

    SciTech Connect (OSTI)

    Sovacool, Benjamin K.; Watts, Charmaine

    2009-05-15T23:59:59.000Z

    With the right mix of leadership and policy, a completely renewable electricity sector for New Zealand and the United States is feasible, achievable, and desirable. (author)

  18. Rev: 10/8/2012 "Let Knowledge Serve the City"

    E-Print Network [OSTI]

    Bertini, Robert L.

    of Transportation (DOT) 5. The International Commission on Radiological Protection (ICRP) 6. The National Academy MAINTENANCE 19 RADIATION SAFETY OPERATIONS MANUAL #12;4 Rev: 10/8/2012 PORTLAND STATE UNIVERSITY RADIATION

  19. V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergyRequirements |

  20. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomenthe House Committee on Energy andDepartment ofAnShare your opinionsCD-4),|Day 7

  1. T-703: Cisco Unified Communications Manager Open Query Interface Lets

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from the GridwiseSiteDepartmentChallengeCompliance7/109 TORNADO46: Debian

  2. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas |DOEEnergy Smooth BromeSoftware Tools1SolarDecathlon

  3. V-220: Juniper Security Threat Response Manager Lets Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has discovered aUsers

  4. California Secretary for Natural Resources Reasserts State of California's Strong Opposition to Flawed Federal Water Legislation

    E-Print Network [OSTI]

    a century old precedent in water law: Congress ought not pre- empt the right of states to manage their own water under state water rights law. If this bill passes, no state will be safe from congressional interference in their water rights laws. Another consequence would be the immediate opposition of states

  5. U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks

    Broader source: Energy.gov [DOE]

    The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

  6. U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  7. Evaluation of flaw characteristics and their influence on inservice inspection reliability. [PWR; BWR

    SciTech Connect (OSTI)

    Becker, F.L.

    1980-01-01T23:59:59.000Z

    This report describes the results of the first year's effort of a five year program which is being conducted by Battelle, Pacific Northwest Laboratories, on behalf of the US Nuclear Regulatory Commission. This initial effort was directed toward identification and quantification of inspection uncertainties, which are likely to occur during inservice inspection of LWR primary piping systems, and their influence on inspection reliability. These experiments were conducted on 304 stainless steel samples, however, the results are equally applicable to other materials. Later portions of the program will extend these measurements and evaluations to other materials and conditions.

  8. Tracking the History of Romani Publications: Challenges Presented by Flawed Data

    E-Print Network [OSTI]

    Husic, Geoff

    2012-12-01T23:59:59.000Z

    . This is the essence of the problem: The official OCLC language code for Romanian is rum. This code was chosen because at the time these codes were established, the spelling Rumanian was still the more common spelling in English. The spelling Romanian became more... are much more likely to encounter and catalog materials in Romanian than in Romani. What has occurred over the years is that many libraries, when cataloging Romanian-language materials in the OCLC WorldCat database, have been miscoding Romanian (language...

  9. Ultrasonic Phased Array Technique for Accurate Flaw Sizing in Dissimilar Metal Welds

    SciTech Connect (OSTI)

    Jonathan D Buttram

    2005-03-11T23:59:59.000Z

    Described is a manual,portable non-destructive technique to determine the through wall height of cracks present in dissimilar metal welds used in the primary coolling systems of pressure water and boiler light water reactors. Current manual methods found in industry have proven not to exhibit the sizing accuracy required by ASME inspection requirement. The technique described demonstrated an accuracy approximately three times that required to ASME Section XI, Appendix 8 qualification.

  10. Distant Observer Tool Quickly Identifies Costly Flaws in CSP Fields (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-12-01T23:59:59.000Z

    Remote control digital photography and metrology are combined to accurately define optical efficiency problems in concentrating solar power (CSP) plants.

  11. EDDY CURRENT TESTING OF FERROMAGNETIC MATERIALS: MODELLING OF MULTIPLE FLAWS IN A

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . Simulation results are obtained through the application of the Volume Integral Method (VIM) [4 integral equation, involving either the electric or the magnetic field, is needed to describe the non-magnetic case completely, in the ferromagnetic case two coupled integral equations have to be solved. Therefore

  12. U-245: Critical Java 0-day flaw exploited | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    the unsuspecting victims' machines REFERENCE LINKS: http:www.net-security.orgsecworld.php?id13484 zero-day CVE-2012-4681 DeepEnd Research http:www.oracle.comtechnetwork...

  13. V-112: Microsoft SharePoint Input Validation Flaws Permit Cross...

    Broader source: Energy.gov (indexed) [DOE]

    four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024...

  14. Two dynamical core formulation flaws exposed by a baroclinic instability test case

    E-Print Network [OSTI]

    Jablonowski, Christiane

    Jablonowski Department of Atmospheric, Oceanic and Space Sciences, University of Michigan, Ann Arbor, MI, USA or climate simulations if physical parameterizations or model components, like the ocean or ice, compensate

  15. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Energy Savers [EERE]

    Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

  16. U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input.

  17. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  18. Physical Model Assisted Probability of Detection in Nondestructive Evaluation for Detecting of Flaws in Titanium

    E-Print Network [OSTI]

    evaluation (NDE) is used to characterize the status or properties of components or structures without causing any permanent physical damage. The aerospace industry is one important NDE application area where/03 (1989) and NTSB/AAR-90/06 (1990)]. In virtually all NDE applications, there are random effects

  19. Yaakov Katz, Jerusalem Post, 2004.08.24: "Police drill reveals security flaws in malls

    E-Print Network [OSTI]

    Bernstein, Daniel

    .03.29: #define NOCHAR -1 register int c; for (;;) { c = *p++; if (...) *q++ = '\\\\'; ... if (c != NOCHAR) if (q

  20. T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site...

    Energy Savers [EERE]

    IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be...

  1. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  2. A STRUCTURAL IMPACT ASSESSMENT OF FLAWS DETECTED DURING ULTRASONIC EXAMINATION OF TANK 15

    SciTech Connect (OSTI)

    Wiersma, B; James Elder, J

    2008-08-21T23:59:59.000Z

    Ultrasonic (UT) inspection of Tank 15 was conducted between April and July 2007 in accordance with the Tank 15 UT inspection plan. This was a planned re-inspection of this tank, the previous one was performed in 2002. Ten cracks were characterized in the previous examination. The re-inspection was performed to verify the present models and understanding for stress corrosion cracking. During this re-examination, one indication that was initially reported as a 'possible perpendicular crack <25% through wall' in 2002, was clearly shown not to be a crack. Additionally, examination of a new area immediately adjacent to other cracks along a vertical weld revealed three new cracks. It is not known when these new cracks formed as they could very well have been present in 2002 as well. Therefore, a total of twelve cracks were evaluated during the re-examination. A critical review of the information describing stress corrosion crack behavior for the SRS waste tanks, as well as a summary review of the service history of Tank 15, was performed. Each crack was then evaluated for service exposure history, consistency of the crack behavior with the current understanding of stress corrosion cracking, and present and future impact to the structural integrity of the tank. Crack instability calculations were performed on each crack for a bounding waste removal loading condition in Tank 15. In all cases, the crack behavior was determined to be consistent with the previous understanding of stress corrosion cracking in the SRS waste tank environment. The length of the cracks was limited due to the short-range nature of the residual stresses near seam, repair and attachment welds. Of the twelve cracks, nine were located in the vapor space above the sludge layer, including the three new cracks. Comparison of the crack lengths measured in 2002 and 2007 revealed that crack growth had occurred in four of the six previously measured vapor space cracks. However, the growth remained within the residual stress zone. None of the three cracks beneath the sludge showed evidence of growth. The impact of the cracks that grew on the future service of Tank 15 was also assessed. Tank 15 is expected to undergo closure activities including sludge waste removal. A bounding loading condition for waste removal of the sludge at the bottom of Tank 15 was considered for this analysis. The analysis showed that the combination of hydrostatic, seismic, pump and weld residual stresses are not expected to drive any of the cracks identified during the Tank 15 UT inspection to instability. Wall thickness mapping for general thinning and pitting was also performed. No significant wall thinning was observed. The average wall thickness values were well above nominal. Two isolated pit-like indications were observed. Both were approximately 30 mils deep. However, the remaining wall thickness was still greater than nominal specified for the original construction plate material. It was recommended that a third examination of selected cracks in Tank 15 be performed in 2014. This examination would provide information to determine whether any additional detectable degradation is occurring in Tank 15 and to supplement the basis for characterization of conditions that are non-aggressive to tank corrosion damage. The in-service inspection program is re-evaluated on a three year periodicity. The Type I and II tanks are not active receipt tanks at present, and are therefore not a part of the In-Service Inspection Program for the Type III Tanks [1]. Changes to the mission for Tank 15 and other Type I and II tanks may be considered by the In-Service Inspection Review Committee (ISIRC) and the program adjusted accordingly.

  3. V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field EmissionFunctionalPortalV > 111 \il :^ a.7

  4. V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment ofDepartment

  5. V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartment of Energy VMware ESX

  6. U-001:Symantec IM Manager Input Validation Flaws | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control No.NREL i s a

  7. COMPRESSION STRENGTH OF CARBON FIBER LAMINATES CONTAINING FLAWS WITH FIBER WAVINESS

    E-Print Network [OSTI]

    compression strengths and failure strains which are borderline for wind turbine blade designs, depending upon the subject of recent studies of blade materials [1-5] and earlier studies of aerospace prepreg laminates [5 by RTM. Recent interest in blade materials has shown a significant shift toward carbon fiber and hybrids

  8. T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery7:

  9. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple |DepartmentCross-SiteLogon

  10. T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthentication orAttacks |

  11. V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | Department of Energy A

  12. V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |Department ofDepartment

  13. U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting Attacks | Department of

  14. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting AttacksForgery, and

  15. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting

  16. U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address|ConductScripting

  17. Eigentheory Let V be a finite dimensional vector space over a field F, and let T : V V

    E-Print Network [OSTI]

    Carrell, Jim

    we've said more about the eigen- value problem. called a semi-simple transformation. It turns out that if T is semi-simple, then the matrix MB B associated to A having initial value v0 is the sequence (vk) with vk = Avk-1, k = 1, 2, . . . Thus v1 = Av0

  18. Prediction of failure behavior of a welded pressure vessel containing flaws during a hydrogen-charged burst test

    SciTech Connect (OSTI)

    Bhuyan, G.S. [Powertech Labs. Inc., Surrey, British Columbia (Canada); Sperling, E.J. [Amoco Corp., Naperville, IL (United States); Shen, G. [CANMET, Ottawa, Ontario (Canada). Metals Technology Labs.; Yin, H. [Mobil Research and Development Corp., Farmers Branch, TX (United States); Rana, M.D. [Praxair, Inc., Tonawanda, NY (United States)

    1996-12-01T23:59:59.000Z

    An industry-government collaborative program was carried out with an aim to promoting the acceptance of fracture mechanics based fitness-for-service assessment methodology for a service-damaged pressure vessel. A collaborative round robin exercise was carried out to predict the fracture behavior of a vessel containing hydrogen damage, fabrication related lack-of-fusion defects, an artificially induced fatigue crack and a localized thinned area. The fracture assessment procedures used include the US ASME Material Property Council`s PREFIS Program based on the British Standard (BS) Published Document (PD) 6493, ASME Section XI and The Central Electricity Generating Board (CEGB) R6 approach; The welding Institute (TWI) CRACKWISE program (based on BS PD6493 Level 2 approach), a variant of the R6 approach, J-tearing instability approaches, various J-estimation schemes, LEFM approach and simplified stress analysis. Assessments were compared with the results obtained from a hydrogen charged burst test of the vessel. Predictions, based on the J-tearing approach, compared well with the actual burst test results. Actual burst pressure was about five times the operating pressure.

  19. Prediction of failure behavior of a welded pressure vessel containing flaws during a hydrogen-charged burst test

    SciTech Connect (OSTI)

    Bhuyan, G.S. [Powertech Labs Inc., Surrey, British Columbia (Canada); Sperling, E.J. [BP-Amoco, Calgary, Alberta (Canada); Shen, G. [CANMET, Ottawa, Ontario (Canada). Metals Technology Labs.; Yin, H. [Mobil Technology Co., Dallas, TX (United States); Rana, M.D. [Praxair, Inc., Tonawanda, NY (United States)

    1999-08-01T23:59:59.000Z

    An industry-government collaborative program was carried out with an aim to promoting the acceptance of fracture mechanics-based fitness-for-service assessment methodology for a service-damaged pressure vessel. A collaborative round robin exercise was carried out to predict the fracture behavior of a vessel containing hydrogen damage, fabrication-related lack-of-fusion defects, an artificially induced fatigue crack, and a localized thinned area. The fracture assessment procedures used include the US ASME Material Property Council`s PREFIS Program based on the British Standard (BS) Published Document (PD) 6493, ASME Section XI and The Central Electricity Generating Board (CEGB) R6 approach, The Welding Institute (TWI) CRACKWISE program (based on BS PD6493 Level 2 approach), a variant of the R6 approach, J-tearing instability approaches, various J-estimation schemes, LEFM approach, and simplified stress analysis. Assessments were compared with the results obtained from a hydrogen-charged burst test of the vessel. Predictions, based on the J-tearing approach, compared well with the actual burst test results. Actual burst pressure was about five times the operating pressure.

  20. AN IMPROVED TREATMENT OF RESIDUAL STRESSES IN FLAW ASSESSMENT OF PIPES AND PRESSURE VESSELS FABRICATED FROM FERRITIC STEELS

    E-Print Network [OSTI]

    Michaleris, Panagiotis

    FABRICATED FROM FERRITIC STEELS William C. Mohr, Panagiotis Michaleris, and Mark T. Kirk Edison Welding ferritic steels. Information on these residual stresses are drawn from the literature; both measured treatment of residual stresses produced by welding in pipes and pressure vessels fabricated from ferritic

  1. Radiation and Reason Why radiation at modest dose rates is quite harmless and current radiation safety regulations are flawed

    E-Print Network [OSTI]

    CERN. Geneva

    2013-01-01T23:59:59.000Z

    Data on the impact of ionising radiation on life are examined in the light of evolutionary biology. This comparison confirms that fear of nuclear radiation is not justified by science itself; rather it originates in a failure of public trust in nuclear science, a relic of the international politics of the Cold War era. Current ionisation safety regulations appease this fear but without scientific support and they need fundamental reformulation. This should change the reaction to accidents like Fukushima, the cost of nuclear energy and the application of nuclear technology to the supply of food and fresh water. Such a boost to the world economy would require that more citizens study and appreciate the science involved and then tell others -- not as much fun as the Higgs, perhaps, but no less important! www.radiationandreason.com

  2. U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  3. T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user.

  4. T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input.

  5. The Physical Flaws of the Global Warming Theory Deep Ocean Circulation Changes as the Primary Climate Driver

    E-Print Network [OSTI]

    Gray, William

    -century and multi-decadal ocean circulation changes. These ocean changes are due to naturally occurring upper ocean for radiation equilibrium is unrealistic for the long-period and slow CO2 rises that are occurring. Only half) simulations are incorrectly designed to block too much infrared (IR) radiation to space. They also do

  6. Development of nondestructive evaluation methods and prediction of effects of flaws on the fracture behavior of structural ceramics

    SciTech Connect (OSTI)

    Ellingson, W.A.; Singh, J.P.; Holloway, D.L.; Dieckman, S.L.; Singh, D.; Sivers, E.A.; Sheen, S.H.; Wheeler, M.J.

    1992-05-01T23:59:59.000Z

    Characterization of ceramic matrix composites (continuous and whisker-type) by nondestructive evaluation (NDE) methods and an understanding of fracture behavior, together with correlation of fracture and NDE data, may provide insight into the prediction of component performance and the development of process technology. Knowledge of the degradation extent of fiber tows or monofilament degradation after processing, extent of open porosity before densification, and filament/fiber alignments before and after processing are also examples of important variables to be measured. Work in this program has emphasized continuous fiber ceramic matrix composites (CFCCs) that use chemical vapor infiltration (CVI)-infiltrated SiC/SiC materials, primarily those made of Nicalon satin or plain weave with 16 {times} 16 tows/in. in 2-D layups. All studied samples were provided by Oak Ridge National Laboratory and were made using 100 layers per inch. CVI specimens with 0/30/60, 0/90, and 0/45 were examined by 3-D X-ray microtomography to characterize in-plane fiber orientations. Current information suggests that for Nicalon-type fiber architecture, a {plus minus}2--1/2{degrees} misalignment may not affect mechanical properties. Thus the near-term goal has been to establish a detection capability for angular orientation. By using 512 {times} 512 images from 3-D X-ray CT data with pixel sizes of < 140 {mu}m and a special 2-D fast-Fourier transform image processing analysis, we have shown that fiber orientations to {plus minus}2--1/2{degrees} with SiC/SiC CVI type 2-D weave architecture can be measured.

  7. Development of nondestructive evaluation methods and prediction of effects of flaws on the fracture behavior of structural ceramics

    SciTech Connect (OSTI)

    Ellingson, W.A.; Singh, J.P.; Sivers, E.A.; Holloway, D.L.; Jacobs, T.D.; Dieckman, S.L.; Singh, D.

    1994-05-01T23:59:59.000Z

    In the NDE area, specimens with different cloth lay-up orientations were examined by a 3-D X-ray microtomography device and image processing to measure and map in-plane fiber orientations. Results show detection sensitivity to better than {plus_minus}3{degrees}. We establish detection of 3-D braid/weave fiber orientation and spacing. Another NDE method, multinuclear ({sup 13}C,{sup 29}Si, and {sup 11B} NMR spectroscopy, is being developed to determine the chemical state of the fiber surface and its potential impact on fiber pullout. We have conducted initial studies to investigate sensitivity to bulk composition of the matrix materials (a,b, amorphous phase, silica, and oxynitride concentration). The first {sup 29}Si NMR experiments focused on methods to enhance the signal from the surface by selectively reducing surface relaxation. Additionally, we have determined that there is sufficient sensitivity of {sup 11}B NMR for monitoring fiber coatings.

  8. Development of nondestructive evaluation methods and prediction of effects of flaws on the fracture behavior of structural ceramics

    SciTech Connect (OSTI)

    Ellingson, W.A.; Singh, J.P.; Holloway, D.L.; Dieckman, S.L.; Singh, D.; Sivers, E.A.; Sheen, S.H.; Wheeler, M.J.

    1992-05-01T23:59:59.000Z

    Characterization of ceramic matrix composites (continuous and whisker-type) by nondestructive evaluation (NDE) methods and an understanding of fracture behavior, together with correlation of fracture and NDE data, may provide insight into the prediction of component performance and the development of process technology. Knowledge of the degradation extent of fiber tows or monofilament degradation after processing, extent of open porosity before densification, and filament/fiber alignments before and after processing are also examples of important variables to be measured. Work in this program has emphasized continuous fiber ceramic matrix composites (CFCCs) that use chemical vapor infiltration (CVI)-infiltrated SiC/SiC materials, primarily those made of Nicalon satin or plain weave with 16 {times} 16 tows/in. in 2-D layups. All studied samples were provided by Oak Ridge National Laboratory and were made using 100 layers per inch. CVI specimens with 0/30/60, 0/90, and 0/45 were examined by 3-D X-ray microtomography to characterize in-plane fiber orientations. Current information suggests that for Nicalon-type fiber architecture, a {plus_minus}2--1/2{degrees} misalignment may not affect mechanical properties. Thus the near-term goal has been to establish a detection capability for angular orientation. By using 512 {times} 512 images from 3-D X-ray CT data with pixel sizes of < 140 {mu}m and a special 2-D fast-Fourier transform image processing analysis, we have shown that fiber orientations to {plus_minus}2--1/2{degrees} with SiC/SiC CVI type 2-D weave architecture can be measured.

  9. PM822 Assignment 3 Due Tuesday, February 26 1. Let A be a non-unital C*-algebra, and let (e) be an approximate identity.

    E-Print Network [OSTI]

    Davidson, Ken

    ) be the Stinespring dilation of (a) Show that if a A and (a )(a) = (a a), then V H is invariant for (a). Hence show inequivalent Stinespring dilations. 5. A von Neumann algebra is a unital C*-subalgebra N of B(H) which is weak

  10. Jim Cochran: Swanton Berry Farm

    E-Print Network [OSTI]

    Farmer, Ellen

    2010-01-01T23:59:59.000Z

    plants. Lets buy 7,000 trucks. Lets own a biodiesel orthree biodiesel companies. Lets own an insurance company.

  11. V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThereDepartment ofFlaw Lets

  12. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact: A local or remote user can...

  13. Regulation of let-7 miRNA biogenesis in C. elegans

    E-Print Network [OSTI]

    Kai, Zoya

    2011-01-01T23:59:59.000Z

    YROM , M. , J ARVIS , R. , C HENG , A. , L ABOURIER , E. , RA. G. , B HUTKAR , A. , Z HENG , G. X. , B OSSON , A. D. , NL ANCASTER , J. M. , C HENG , J. Q. & S ELLERS , T. A. (

  14. Regulation of let-7 miRNA biogenesis in C. elegans

    E-Print Network [OSTI]

    Kai, Zoya

    2011-01-01T23:59:59.000Z

    HindIII, and then pSEH33 was CIP treated for one hour, andthe ?TREpAEP19 construct was CIP treated for one hour, andovernight. Each construct was CIP treated for one hour, gel

  15. Don't Let Connecticut's Trash Plants Go Private April 19, 2006

    E-Print Network [OSTI]

    Columbia University

    landfills and to generate needed electricity. As a result, we have a waste-to-energy system that manages to experience the same runaway costs that the state is dealing with now among electricity generators. Unforeseen, the Connecticut General Assembly passed legislation deregulating the electric industry. While the move toward

  16. On Human Culture Let us not dream that reason can ever be popular. Passions, emo-

    E-Print Network [OSTI]

    Page, Rex L.

    languages. John Viega and Gary McGraw in Building Secure Software, 2002 Procedural programming is a monumental waste of human energy. 1985 The only important design or engineering aid offered by the object oriented paradigm is abstract data types, and they have been in use for at least 40 years. 1999

  17. Studies of Bystander Effects in 3-D Tissue Systems Using a Low-LET Microbeam

    SciTech Connect (OSTI)

    Brenner, David J.

    2009-07-17T23:59:59.000Z

    It is now accepted that biological effects may occur in cells that were not themselves traversed by ionizing radiation but are close to those that were. Little is known about the mechanism underlying such a bystander effect, although cell-to-cell communication is thought to be important. Previous work demonstrated a significant bystander effect for clonogenic survival and oncogenic transformation in C3H 10T(1/2) cells. Additional studies were undertaken to assess the importance of the degree of cell-to-cell contact at the time of irradiation on the magnitude of this bystander effect by varying the cell density. When 10% of cells were exposed to a range of 2-12 alpha particles, a significantly greater number of cells were inactivated when cells were irradiated at high density than at low density. In addition, the oncogenic transformation frequency was significantly higher in high-density cultures. These results suggest that when a cell is hit by radiation, the transmission of the bystander signal through cell-to-cell contact is an important mediator of the effect, implicating the involvement of intracellular communication through gap junctions. Additional studies to address the relationship between the bystander effect and the adaptive response were undertaken. A novel apparatus, where targeted and non-targeted cells were grown in close proximity, was used to investigate these. It was further examined whether a bystander effect or an adaptive response could be induced by a factor(s) present in the supernatants of cells exposed to a high or low dose of X-rays, respectively. When non-hit cells were co-cultured for 24 h with cells irradiated with 5 Gy alpha-particles, a significant increase in both cell killing and oncogenic transformation frequency was observed. If these cells were treated with 2 cGy X-rays 5 h before co-culture with irradiated cells, approximately 95% of the bystander effect was cancelled out. A 2.5-fold decrease in the oncogenic transformation frequency was also observed. When cells were cultured in medium donated from cells exposed to 5 Gy X-rays, a significant bystander effect was observed for clonogenic survival. When cells were cultured for 5 h with supernatant from donor cells exposed to 2 cGy and were then irradiated with 4 Gy X-rays, they failed to show an increase in survival compared with cells directly irradiated with 4 Gy. However, a twofold reduction in the oncogenic transformation frequency was seen. An adaptive dose of X-rays cancelled out the majority of the bystander effect produced by alpha-particles. For oncogenic transformation, but not cell survival, radioadaption can occur in unirradiated cells via a transmissible factor(s). A pilot study was undertaken to observe the bystander effect in a realistic multicellular three-dimensional morphology. We found bystander responses in a three-dimensional, normal human-tissue system. Endpoints were induction of micronucleated and apoptotic cells. A charged-particle microbeam was used, allowing irradiation of cells in defined locations in the tissue yet guaranteeing that no cells located more than a few micrometers away receive any radiation exposure. Unirradiated cells up to 1 mm distant from irradiated cells showed a significant enhancement in effect over background, with an average increase in effect of 1.7-fold for micronuclei and 2.8-fold for apoptosis. The surprisingly long range of bystander signals in human tissue suggests that bystander responses may be important in extrapolating radiation risk estimates from epidemiologically accessible doses down to very low doses where nonhit bystander cells will predominate. Finally, it would be of great benefit to develop a reproducible tissue system suitable for critical radiobiological assays. We have developed a reliable protocol to harvest cells from tissue samples and to investigate the damage induced on a single cell basis. In order to result in a valid tool for bystander experiments, the method focuses on processing and analyzing radiation damage in individual cells as a function of their rela

  18. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to...

  19. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in...

  20. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    process when shutting down the Directory Server. Multiple scripts set the LDLIBRARYPATH environment variable to an insecure value containing an empty path CVE-2011-0532. A...

  1. Intervention Let us assume for the moment that the evidence presented

    E-Print Network [OSTI]

    Leistikow, Bruce N.

    shows but has no formal program of enforcement operations at these events. Instead, ATF "conducts investigative operations at gun shows when it has law enforcement intelligence that illegal firearms activity

  2. Let Caches Decay: Reducing Leakage Energy via Exploitation of Cache Generational Behavior

    E-Print Network [OSTI]

    Martonosi, Margaret

    's proportion of total chip power will increase signi#12;cantly. This paper examines methods for reducing in high-performance CPUs. Although power used to mainly be a concern in battery-operated devices, thermal Department of Electrical Engineering Princeton University mrm@ee.princeton.edu Power dissipation

  3. U-155: WebCalendar Access Control and File Inclusion Bugs Let...

    Broader source: Energy.gov (indexed) [DOE]

    were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966...

  4. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Broader source: Energy.gov [DOE]

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  5. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases.

  6. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  7. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  8. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  9. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Broader source: Energy.gov (indexed) [DOE]

    or logical Layer-2 network as the affected system to gain an unauthenticated root shell. REFERENCE LINKS: SecurityTracker Alert ID: 1028682 Secunia Advisory SA53730 Cisco...

  10. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Broader source: Energy.gov (indexed) [DOE]

    2.0.12.PatchesSoftware Downloads Update Firefox 3.6.14 Mozilla Downloads SeaMonkey 2.1 Beta 2 Addthis Related Articles T-528: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML...

  11. V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints...

    Broader source: Energy.gov (indexed) [DOE]

    ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT...

  12. T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets...

    Broader source: Energy.gov (indexed) [DOE]

    the target service to crash. On Netware-based systems, the system may crash. PLATFORM: Red Hat Enterprise, SuSE,AIX, HPUX, Solaris, Windows 2000, 2003 ABSTRACT: A remote user...

  13. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  14. U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP MFP Digital Sending Software. A local user can obtain potentially sensitive information.

  15. SAMP, the Simple Application Messaging Protocol: Letting applications talk to each other

    E-Print Network [OSTI]

    Taylor, M B; Taylor, J

    2015-01-01T23:59:59.000Z

    SAMP, the Simple Application Messaging Protocol, is a hub-based communication standard for the exchange of data and control between participating client applications. It has been developed within the context of the Virtual Observatory with the aim of enabling specialised data analysis tools to cooperate as a loosely integrated suite, and is now in use by many and varied desktop and web-based applications dealing with astronomical data. This paper reviews the requirements and design principles that led to SAMP's specification, provides a high-level description of the protocol, and discusses some of its common and possible future usage patterns, with particular attention to those factors that have aided its success in practice.

  16. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Broader source: Energy.gov (indexed) [DOE]

    A remote user on the local network with the ability to conduct a man-in-the-middle attack can impersonate the kdump SSH server to potentially access information in vmcore dumps...

  17. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Office of Environmental Management (EM)

    next-generation VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security...

  18. Math 525, Midterm exam, Spring 2014 1. Let f be a non-constant ...

    E-Print Network [OSTI]

    2014-03-04T23:59:59.000Z

    2?if(1) = ?i cos 1, because f is analytic inside and on the contour of integration. ... A closed curve can wind about i and ?i arbitrary number of times in positive or.

  19. T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    obtain elevated privileges on the target system. A local user can trigger a use-after free or null pointer dereference to execute arbitrary commands on the target system with...

  20. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct...

    Broader source: Energy.gov (indexed) [DOE]

    can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID:...

  1. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issue is caused due to the vmrun utility incorrectly loading libraries from a certain directory. This can be exploited to execute arbitrary code with privileges of the user running...

  2. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  3. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    Articles U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-174: RSA Authentication Manager Writes Operating System, SNMP,...

  4. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    and Change User Passwords U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-173: Symantec Web Gateway Multiple Vulnerabilities...

  5. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks...

  6. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    the target user opens a valid Remote Desktop configuration file (.rdp) from the same directory as the DLL file, the application may load the remote user's DLL instead of the...

  7. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    issue does not affect Mac OS X systems. Viewing an image in a maliciously prepared directory may lead to arbitrary code execution. A path searching issue exists in QuickTime...

  8. FLI-1 Flightless-1 and LET-60 Ras control germ line morphogenesis in C. elegans

    E-Print Network [OSTI]

    Lu, Jiamiao; Dentler, William L., Jr; Lundquist, Erik A.

    2008-05-16T23:59:59.000Z

    Background: In the C. elegans germ line, syncytial germ line nuclei are arranged at the cortex of the germ line as they exit mitosis and enter meiosis, forming a nucleus-free core of germ line cytoplasm called the rachis. ...

  9. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  10. RaiseyourVoice, LetYourself be Heard! http:llwww.llsc.emet.F~olces

    E-Print Network [OSTI]

    Gadagkar, Raghavendra

    of the challengs we face today require that we break these boundaries and simultmeously utilize the knowledge base to understand and mitigate ethnic and cdtural conflict. A very little reflection will convince us that every one toseveral months. Students registered for various courses in IISc (and also at other institutes in Bangalore

  11. Letting The Sun Shine On Solar Costs: An Empirical Investigation Of Photovoltaic Cost Trends In California

    E-Print Network [OSTI]

    Wiser, Ryan; Bolinger, Mark; Cappers, Peter; Margolis, Robert

    2006-01-01T23:59:59.000Z

    installations. This California Solar Initiative has the2. CALIFORNIAS SOLAR PROGRAMS Californias PV market isramifications, both for Californias new solar programs and

  12. Let Our Freak Flags Fly: Shrek the Musical and the Branding of Diversity

    E-Print Network [OSTI]

    Brater, Jessica; Vecchio, Jessica Del; Friedman, Andrew; Holmstrom, Bethany; Laine, Eero; Levit, Donald; Miller, Hillary; Savran, David; Smith, Carly Griffin; Watt, Kenn; Young, Catherine; Zazzali, Peter

    2010-05-01T23:59:59.000Z

    that is perceived, fairly or not, as a family show.24 Despite the poor sales, the appearance of the bright green ogre on Broadway was part of DreamWorkss efforts to sell outto expand its mass-media market to reach new consumers in the economically minor.../opencms/company/investor_relations/annualreports.html (accessed 3 August 2009). 43 Jeffrey Katzenberg, Dear Fellow Shareholders, in ibid. 44 Ibid. 45 Steven Birenberg, How More Media Companies Brave the Headwinds, Yahoo! Finance, 15 De- cember 2008, available at http://finance.yahoo.com/news/How-More-Media...

  13. Letting the Sun Shine on Solar Costs: An Empirical Investigation of Photovoltaic Cost Trends in California

    SciTech Connect (OSTI)

    Wiser, R.; Bolinger, M.; Cappers, P.; Margolis, R.

    2006-01-01T23:59:59.000Z

    This report provides a comprehensive analysis of grid-connected solar photovoltaic (PV) cost trends in California, which is by far the largest PV market in the United States. The findings of this work may help stakeholders to understand important trends in the California PV market, and policymakers to design more effective solar incentive programs--a particularly important objective given the recent announcement from the California Public Utilities Commission (CPUC) to establish an 11-year, $3.2 billion incentive program for customer-sited solar. The study statistically analyzes the installed cost of grid-connected PV systems funded by the state's two largest solar rebate programs, overseen by the California Energy Commission (CEC) [operating since 1998] and the CPUC [operating since 2001].

  14. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  15. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  16. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input before displaying the...

  17. T-675: Apple Laptop Battery Interface Lets Local Users Deny Service...

    Broader source: Energy.gov (indexed) [DOE]

    7:03am Addthis PROBLEM: A vulnerability was reported in the battery interface used in Apple laptop models. A local user can cause denial of service conditions. PLATFORM: Mac OS X...

  18. T-675: Apple Laptop Battery Interface Lets Local Users Deny Service...

    Broader source: Energy.gov (indexed) [DOE]

    3:15pm Addthis PROBLEM: A vulnerability was reported in the battery interface used in Apple laptop models. A local user can cause denial of service conditions. PLATFORM: Mac OS X...

  19. Kronecker-Jacobi symbol and Quadratic Reciprocity Let Q be the ...

    E-Print Network [OSTI]

    2012-11-29T23:59:59.000Z

    Proof. Since d(2) = 8, the Theorem (with b = 2) reduces the problem to the simple cases a = 1,3,5,7. Corollary 3. If q is an odd prime, q? = (?1) q?1. 2 q, and a = 0...

  20. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6...

  1. -News Home Help EU offers 'sweetener' to Japan to let France host nuclear project

    E-Print Network [OSTI]

    to host a revolutionary nuclear fusion project. news web sites "I cannot elaborate on the sweetener, but I Wednesday after talks in Vienna on the International Thermonuclear Experimental Reactor (ITER). news web ( - ) -- which have supported the Japanese bid -- plus Russia and China, which back the EU bid.news web sites

  2. LET dependence of radiation-induced bystander effects using human prostate tumor cells

    E-Print Network [OSTI]

    Anzenberg, Vered

    2008-01-01T23:59:59.000Z

    In the past fifteen years, evidence provided by many independent research groups have indicated higher numbers of cells exhibiting damage than expected based on the number of cells traversed by the radiation. This phenomenon ...

  3. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can be exploited by...

  4. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

  5. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Broader source: Energy.gov (indexed) [DOE]

    Support & Downloads (2.0.6.RELEASE, 2.1.2.RELEASE). Addthis Related Articles V-013: EMC Avamar Client for VMware Discloses Server Password to Local Users T-575: OpenLDAP...

  6. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  7. U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system.

  8. Math 553 Practice for final December 13 2007 W. Heinzer 1. Let G ...

    E-Print Network [OSTI]

    2007-12-01T23:59:59.000Z

    If the finite group G has composition series 1 = N0 ? N1 ? N2 = G and 1 = M0 ? M1 ?? Mr = G, prove that r = 2. 5. List representatives for each conjugacy...

  9. Let The People Know the Facts: Can Government Information Removed From the Internet Be Reclaimed?

    E-Print Network [OSTI]

    2006-01-01T23:59:59.000Z

    Hole, Classified Letters Regarding FBI Whistleblower Sibel90. 93. Democrats.com, FBI Whistleblower Breaks Ashcrofts20edmonds. 94. Kevin Bohn, FBI Translator Suit Dismissed

  10. Don't Let Your Money and Hot Water Go Down the Drain | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehiclesTanklessDOJ Title StandardsEngineersExportsDomestic Health

  11. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field EmissionFunctionalPortalV > 111 \il :^ a.7 V

  12. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field EmissionFunctionalPortalV > 111 \il3: RedLogin

  13. INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf11-161-LNG | Department ofHTS Cable ProjectsHistoryia/802871 IA

  14. V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & Solar Power in the

  15. V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & Solar PowerDepartment of

  16. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOS

  17. V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment of

  18. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment ofDepartment of

  19. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment

  20. V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartmentof Energy iOS

  1. V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartment of Energy

  2. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartmentApple Mac OS X updateAttacks,

  3. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartmentApple Mac OS X

  4. V-144: HP Printers Let Remote Users Access Files on the Printer |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartmentApple Mac OS XCode |A

  5. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartmentApple Mac OS

  6. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBM

  7. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBMof

  8. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBMof8:

  9. Let us count the ways. We've built programs that reflect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces and Interfaces Sample6, 2011 LawrenceE C HLester to lead ORISE's

  10. Turn Down the Temp, But Don't Let Your Pipes Freeze! | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyThe EnergyDepartment7DepartmentEnergy TurbineTurboThe USTurn

  11. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control No.NREL i s

  12. Let's Try That Again: Selling the Teapot Dome Oil Field | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen OwnedofDepartment ofJared Temanson -of Energy 1 ofDavidThe

  13. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Environmental Management (EM)

    data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to reload...

  14. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Environmental Management (EM)

    Controller Software for Integrated Services Module 300 and Cisco Services-Ready Engine 700, 710, 900, and 910 ABSTRACT: A remote authenticated user can execute arbitrary...

  15. Let's eatfor the health of it ChooseMyPlate.gov

    E-Print Network [OSTI]

    Canola oil Corn oil Cottonseed oil Olive oil Peanut oil Safflower oil Sunflower oil Tub (soft) margarine

  16. Letting The Sun Shine On Solar Costs: An Empirical Investigation Of Photovoltaic Cost Trends In California

    E-Print Network [OSTI]

    Wiser, Ryan; Bolinger, Mark; Cappers, Peter; Margolis, Robert

    2006-01-01T23:59:59.000Z

    INVESTIGATION OF PHOTOVOLTAIC COST TRENDS IN CALIFORNIA RyanInvestigation of Photovoltaic Cost Trends in California,cost of customer-sited, grid-connected solar photovoltaic (

  17. Gravity Train Solution Let x(t) be the coordinate along the tunnel with ...

    E-Print Network [OSTI]

    2011-04-01T23:59:59.000Z

    Mar 31, 2011 ... middle, r the distance from the train to the center of the Earth. Then x = r cos?,. (

  18. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage » SearchEnergyDepartmentScopingOverview * Analyzer I nstrument aTime |Time

  19. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystems

  20. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery Attacks and

  1. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery AttacksCode |

  2. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery AttacksCode

  3. T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery7:|

  4. T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple |Department

  5. T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple

  6. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthentication or Obtain

  7. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthentication

  8. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from the GridwiseSiteDepartmentChallengeCompliance7/109 TORNADO * FLASH

  9. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from the GridwiseSiteDepartmentChallengeCompliance7/109 TORNADO *Arbitrary Code

  10. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian updateCommands on

  11. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian updateCommands

  12. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian

  13. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian||

  14. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023:Addresses | Department

  15. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsers Deny Service |

  16. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsers Deny Service

  17. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsersExecute

  18. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | Department of

  19. V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | DepartmentDepartment

  20. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks